0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:23:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:23:59 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:23:59 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:23:59 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 322.269133][T12539] encrypted_key: master key parameter 'j˜0ã' is invalid 11:23:59 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb962004", 0xc, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:23:59 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:23:59 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:23:59 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:23:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 322.586220][T12563] encrypted_key: master key parameter '' is invalid 11:23:59 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:23:59 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb962004", 0xc, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 322.816419][T12578] encrypted_key: master key parameter '' is invalid [ 323.949455][ T2867] device bridge_slave_1 left promiscuous mode [ 323.955744][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.009709][ T2867] device bridge_slave_0 left promiscuous mode [ 324.015979][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.360247][ T2867] device hsr_slave_1 left promiscuous mode [ 325.413730][ T2867] device hsr_slave_0 left promiscuous mode [ 325.472694][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 325.483494][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 325.493956][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 325.543531][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 325.624156][ T2867] bond0 (unregistering): Released all slaves [ 325.726538][T12584] IPVS: ftp: loaded support on port[0] = 21 [ 325.777866][T12584] chnl_net:caif_netlink_parms(): no params data found [ 325.804016][T12584] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.811280][T12584] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.819263][T12584] device bridge_slave_0 entered promiscuous mode [ 325.826696][T12584] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.834273][T12584] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.842072][T12584] device bridge_slave_1 entered promiscuous mode [ 325.858861][T12584] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 325.868541][T12584] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 325.884588][T12584] team0: Port device team_slave_0 added [ 325.893203][T12584] team0: Port device team_slave_1 added [ 325.930175][T12584] device hsr_slave_0 entered promiscuous mode [ 325.978954][T12584] device hsr_slave_1 entered promiscuous mode [ 326.072921][T12584] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.080087][T12584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.087425][T12584] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.094542][T12584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.151224][T12584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.170277][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.185381][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.193208][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.211572][T12584] 8021q: adding VLAN 0 to HW filter on device team0 [ 326.223579][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.232466][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.239570][ T8892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.266269][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.276537][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.283668][ T7758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.299587][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.316677][T12584] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 326.333518][T12584] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 326.348136][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 326.361629][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.374957][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.387158][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.407444][T12584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.422198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:24:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:03 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb962004", 0xc, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 326.528762][T12592] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 326.602601][T12599] encrypted_key: master key parameter '' is invalid 11:24:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:03 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830", 0xf, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 326.890714][T12623] encrypted_key: master key parameter 'j˜0' is invalid 11:24:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a", 0xd, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 327.381949][T12648] encrypted_key: master key parameter 'j' is invalid 11:24:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a", 0xd, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 327.614264][T12666] encrypted_key: master key parameter 'j' is invalid 11:24:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:05 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:05 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:05 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 327.926288][T12686] encrypted_key: master key parameter '' is invalid [ 329.277151][T12705] IPVS: ftp: loaded support on port[0] = 21 [ 329.386531][T12705] chnl_net:caif_netlink_parms(): no params data found [ 329.412837][T12705] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.420204][T12705] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.427787][T12705] device bridge_slave_0 entered promiscuous mode [ 329.435647][T12705] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.442924][T12705] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.450867][T12705] device bridge_slave_1 entered promiscuous mode [ 329.461550][ T2867] device bridge_slave_1 left promiscuous mode [ 329.467739][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.509613][ T2867] device bridge_slave_0 left promiscuous mode [ 329.515816][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.870983][ T2867] device hsr_slave_1 left promiscuous mode [ 330.913016][ T2867] device hsr_slave_0 left promiscuous mode [ 330.972680][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 330.983636][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 330.994439][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 331.033334][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 331.114485][ T2867] bond0 (unregistering): Released all slaves [ 331.225456][T12705] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 331.235494][T12705] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 331.251589][T12705] team0: Port device team_slave_0 added [ 331.258225][T12705] team0: Port device team_slave_1 added [ 331.320175][T12705] device hsr_slave_0 entered promiscuous mode [ 331.378981][T12705] device hsr_slave_1 entered promiscuous mode [ 331.460618][T12705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.472791][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 331.482733][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.490808][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.502016][T12705] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.576364][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.585718][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.594646][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.601785][ T8892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.621007][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.629488][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.638081][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.646977][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.654193][ T7758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.669236][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.677944][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.691857][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.710474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.719088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.727535][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.740092][T12705] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 331.752487][T12705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.761931][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.781625][T12705] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:09 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 331.916502][T12713] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 332.007814][T12723] encrypted_key: master key parameter '' is invalid 11:24:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 332.267800][T12739] encrypted_key: master key parameter '' is invalid 11:24:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb962004", 0xc, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 332.670164][T12753] encrypted_key: master key parameter '' is invalid 11:24:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:10 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb962004", 0xc, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:10 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:10 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:10 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 332.951017][T12777] encrypted_key: master key parameter '' is invalid 11:24:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:10 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb962004", 0xc, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:10 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:10 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:10 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:10 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:10 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 333.334433][T12798] encrypted_key: master key parameter '' is invalid [ 334.699647][T12819] IPVS: ftp: loaded support on port[0] = 21 [ 334.799931][T12819] chnl_net:caif_netlink_parms(): no params data found [ 334.824187][T12819] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.831801][T12819] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.839708][T12819] device bridge_slave_0 entered promiscuous mode [ 334.896655][T12819] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.904308][T12819] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.919757][T12819] device bridge_slave_1 entered promiscuous mode [ 334.981639][T12819] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 334.991907][T12819] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 335.006976][T12819] team0: Port device team_slave_0 added [ 335.014534][T12819] team0: Port device team_slave_1 added [ 335.026363][ T2867] device bridge_slave_1 left promiscuous mode [ 335.033196][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.089368][ T2867] device bridge_slave_0 left promiscuous mode [ 335.095643][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.461029][ T2867] device hsr_slave_1 left promiscuous mode [ 336.503055][ T2867] device hsr_slave_0 left promiscuous mode [ 336.543090][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 336.553891][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 336.565193][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 336.603842][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 336.694526][ T2867] bond0 (unregistering): Released all slaves [ 336.831120][T12819] device hsr_slave_0 entered promiscuous mode [ 336.871635][T12819] device hsr_slave_1 entered promiscuous mode [ 336.958230][T12819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.969129][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.976710][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.987424][T12819] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.997213][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.005943][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.014822][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.021934][ T7758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.031134][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.100014][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.109289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.117679][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.124793][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.134180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.143414][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.152221][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.161284][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.170530][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.182978][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.193692][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.202901][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.221664][T12819] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 337.244535][T12819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.254802][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.269513][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.277950][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.306201][T12819] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:14 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 337.404388][T12826] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 337.493239][T12833] encrypted_key: master key parameter '' is invalid 11:24:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:14 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb96", 0xa, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 337.690395][T12850] encrypted_key: insufficient parameters specified 11:24:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r3}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb96", 0xa, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 338.105036][T12869] encrypted_key: insufficient parameters specified 11:24:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:15 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb96", 0xa, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 338.298246][T12883] encrypted_key: insufficient parameters specified 11:24:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:15 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 338.521057][T12897] encrypted_key: master key parameter '' is invalid 11:24:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:15 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 338.752265][T12913] encrypted_key: master key parameter '' is invalid [ 340.132633][T12928] IPVS: ftp: loaded support on port[0] = 21 [ 340.233725][T12928] chnl_net:caif_netlink_parms(): no params data found [ 340.257773][T12928] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.265209][T12928] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.272931][T12928] device bridge_slave_0 entered promiscuous mode [ 340.327437][T12928] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.334759][T12928] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.342641][T12928] device bridge_slave_1 entered promiscuous mode [ 340.354547][ T2867] device bridge_slave_1 left promiscuous mode [ 340.360836][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.399637][ T2867] device bridge_slave_0 left promiscuous mode [ 340.405863][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.750463][ T2867] device hsr_slave_1 left promiscuous mode [ 341.803461][ T2867] device hsr_slave_0 left promiscuous mode [ 341.891478][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 341.904778][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 341.915451][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 341.954182][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 342.025174][ T2867] bond0 (unregistering): Released all slaves [ 342.149424][T12928] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 342.159674][T12928] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 342.174773][T12928] team0: Port device team_slave_0 added [ 342.182364][T12928] team0: Port device team_slave_1 added [ 342.231031][T12928] device hsr_slave_0 entered promiscuous mode [ 342.268893][T12928] device hsr_slave_1 entered promiscuous mode [ 342.341167][T12928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.355249][T12928] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.388857][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 342.403757][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 342.412496][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.440178][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.449658][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.458040][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.465265][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.474360][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.483787][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.492410][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.499506][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.507309][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 342.516391][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 342.530103][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 342.542764][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 342.564960][T12928] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 342.576254][T12928] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 342.593029][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 342.603962][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 342.615529][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.626067][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.653723][T12928] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 342.662503][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:24:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) [ 342.808099][T12936] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 342.898259][T12942] encrypted_key: master key parameter '' is invalid 11:24:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 343.231900][T12973] encrypted_key: master key parameter '' is invalid 11:24:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 343.617933][T12992] encrypted_key: master key parameter '' is invalid 11:24:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:21 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 343.861989][T13007] encrypted_key: master key parameter '' is invalid 11:24:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:21 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:21 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:21 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:21 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:21 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 344.103229][T13026] encrypted_key: master key parameter '' is invalid 11:24:21 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:21 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 344.362669][T13046] encrypted_key: master key parameter '' is invalid [ 345.675716][T13053] IPVS: ftp: loaded support on port[0] = 21 [ 345.774738][T13053] chnl_net:caif_netlink_parms(): no params data found [ 345.844747][T13053] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.852079][T13053] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.860111][T13053] device bridge_slave_0 entered promiscuous mode [ 345.867623][T13053] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.874926][T13053] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.882603][T13053] device bridge_slave_1 entered promiscuous mode [ 345.894810][ T2867] device bridge_slave_1 left promiscuous mode [ 345.902961][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.949773][ T2867] device bridge_slave_0 left promiscuous mode [ 345.955935][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.311064][ T2867] device hsr_slave_1 left promiscuous mode [ 347.362262][ T2867] device hsr_slave_0 left promiscuous mode [ 347.412898][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 347.423784][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 347.434469][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 347.474864][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 347.542333][ T2867] bond0 (unregistering): Released all slaves [ 347.657832][T13053] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 347.668306][T13053] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 347.686584][T13053] team0: Port device team_slave_0 added [ 347.694078][T13053] team0: Port device team_slave_1 added [ 347.740520][T13053] device hsr_slave_0 entered promiscuous mode [ 347.788920][T13053] device hsr_slave_1 entered promiscuous mode [ 347.870111][T13053] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.882529][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 347.892606][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.900521][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.911387][T13053] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.921626][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.930446][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.939871][ T8704] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.946930][ T8704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.955124][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.020591][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.034563][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.043519][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.051154][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.086097][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 348.095347][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 348.111314][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.125616][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.134495][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.153102][T13053] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 348.170022][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.179058][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.186844][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.217127][T13053] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 348.365307][T13061] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:25 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 348.451745][T13066] encrypted_key: master key parameter '' is invalid 11:24:25 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 348.600403][T13079] encrypted_key: master key parameter '' is invalid 11:24:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:26 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:26 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 349.108150][T13107] encrypted_key: master key parameter '' is invalid 11:24:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:26 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 349.431604][T13129] encrypted_key: master key parameter '' is invalid 11:24:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:26 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:26 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 349.702005][T13150] encrypted_key: master key parameter '' is invalid [ 351.090215][T13164] IPVS: ftp: loaded support on port[0] = 21 [ 351.112415][ T2867] device bridge_slave_1 left promiscuous mode [ 351.119709][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.189287][ T2867] device bridge_slave_0 left promiscuous mode [ 351.195493][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.541181][ T2867] device hsr_slave_1 left promiscuous mode [ 352.611356][ T2867] device hsr_slave_0 left promiscuous mode [ 352.682911][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 352.693870][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 352.704632][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 352.743632][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 352.824771][ T2867] bond0 (unregistering): Released all slaves [ 352.968011][T13164] chnl_net:caif_netlink_parms(): no params data found [ 352.992782][T13164] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.000079][T13164] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.007633][T13164] device bridge_slave_0 entered promiscuous mode [ 353.015227][T13164] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.022443][T13164] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.030156][T13164] device bridge_slave_1 entered promiscuous mode [ 353.046324][T13164] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 353.056230][T13164] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 353.074269][T13164] team0: Port device team_slave_0 added [ 353.081368][T13164] team0: Port device team_slave_1 added [ 353.140131][T13164] device hsr_slave_0 entered promiscuous mode [ 353.198872][T13164] device hsr_slave_1 entered promiscuous mode [ 353.287900][T13164] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.295052][T13164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.302416][T13164] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.309517][T13164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.366372][T13164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.384079][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.394104][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.406218][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.420855][T13164] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.439034][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.447960][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.455082][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.484788][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.493983][ T8704] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.501093][ T8704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.516285][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 353.538871][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 353.546920][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 353.561218][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.575956][T13164] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 353.591485][T13164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 353.605578][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.634949][T13164] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:31 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 353.755409][T13172] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 353.868911][T13180] encrypted_key: master key parameter '' is invalid 11:24:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 354.101347][T13200] encrypted_key: master key parameter '' is invalid 11:24:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 354.573354][T13230] encrypted_key: master key parameter '' is invalid 11:24:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:32 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:32 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:32 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 354.875496][T13247] encrypted_key: master key parameter '' is invalid 11:24:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:32 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:32 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:32 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:32 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:32 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 355.172653][T13270] encrypted_key: master key parameter '' is invalid 11:24:32 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 356.584911][T13292] IPVS: ftp: loaded support on port[0] = 21 [ 356.636915][T13292] chnl_net:caif_netlink_parms(): no params data found [ 356.709346][T13292] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.716434][T13292] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.724426][T13292] device bridge_slave_0 entered promiscuous mode [ 356.732189][T13292] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.739365][T13292] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.746901][T13292] device bridge_slave_1 entered promiscuous mode [ 356.760353][ T2867] device bridge_slave_1 left promiscuous mode [ 356.766530][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.809789][ T2867] device bridge_slave_0 left promiscuous mode [ 356.815993][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.200166][ T2867] device hsr_slave_1 left promiscuous mode [ 358.253071][ T2867] device hsr_slave_0 left promiscuous mode [ 358.313408][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 358.324423][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 358.335504][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 358.373953][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 358.455762][ T2867] bond0 (unregistering): Released all slaves [ 358.553375][T13292] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 358.563970][T13292] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 358.580555][T13292] team0: Port device team_slave_0 added [ 358.587608][T13292] team0: Port device team_slave_1 added [ 358.641469][T13292] device hsr_slave_0 entered promiscuous mode [ 358.678839][T13292] device hsr_slave_1 entered promiscuous mode [ 358.760118][T13292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.777003][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.785357][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.844921][T13292] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.855856][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.869758][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.878170][ T8704] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.885327][ T8704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.916310][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 358.924875][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.942082][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.956148][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.963284][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.976816][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 358.985684][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 358.999751][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.008312][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.028270][T13292] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 359.044819][T13292] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 359.059152][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 359.066916][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.082457][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.106231][T13292] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.116936][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:24:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x0, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 359.251638][T13300] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 359.351143][T13307] encrypted_key: master key parameter '' is invalid 11:24:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x0, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 359.592540][T13325] encrypted_key: master key parameter '' is invalid 11:24:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x0, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 359.804935][T13343] encrypted_key: master key parameter '' is invalid 11:24:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:37 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:37 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:37 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 360.137329][T13357] encrypted_key: master key parameter '' is invalid 11:24:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:37 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 360.354417][T13371] encrypted_key: master key parameter '' is invalid 11:24:37 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:37 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:37 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:37 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 360.590368][T13385] encrypted_key: master key parameter '' is invalid 11:24:37 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:37 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:37 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:37 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 360.819652][T13403] encrypted_key: master key parameter '' is invalid [ 362.132410][T13416] IPVS: ftp: loaded support on port[0] = 21 [ 362.184685][ T2867] device bridge_slave_1 left promiscuous mode [ 362.192686][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.249543][ T2867] device bridge_slave_0 left promiscuous mode [ 362.255747][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.601413][ T2867] device hsr_slave_1 left promiscuous mode [ 363.642976][ T2867] device hsr_slave_0 left promiscuous mode [ 363.711430][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 363.723707][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 363.734939][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 363.783097][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 363.864831][ T2867] bond0 (unregistering): Released all slaves [ 363.992375][T13416] chnl_net:caif_netlink_parms(): no params data found [ 364.015980][T13416] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.023237][T13416] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.031266][T13416] device bridge_slave_0 entered promiscuous mode [ 364.038949][T13416] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.046069][T13416] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.054542][T13416] device bridge_slave_1 entered promiscuous mode [ 364.073632][T13416] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 364.083468][T13416] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 364.098115][T13416] team0: Port device team_slave_0 added [ 364.107896][T13416] team0: Port device team_slave_1 added [ 364.160112][T13416] device hsr_slave_0 entered promiscuous mode [ 364.198811][T13416] device hsr_slave_1 entered promiscuous mode [ 364.247751][T13416] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.254893][T13416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.262307][T13416] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.269494][T13416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.297455][T13416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.309332][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.317574][ T8704] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.325511][ T8704] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.334353][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 364.345946][T13416] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.404355][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.417394][ T8704] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.424540][ T8704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.451371][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.460778][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.467862][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.476799][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 364.486958][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 364.505174][T13416] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 364.516441][T13416] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 364.533602][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 364.543095][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.556020][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.576472][T13416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 364.591173][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 364.718299][T13424] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:41 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:41 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:42 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 364.845722][T13433] encrypted_key: master key parameter '' is invalid [ 365.013830][T13443] encrypted_key: master key parameter '' is invalid 11:24:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:42 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 365.502662][T13467] encrypted_key: master key parameter '' is invalid 11:24:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:42 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:43 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 365.843785][T13484] encrypted_key: master key parameter '' is invalid 11:24:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:43 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:43 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:43 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:43 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 366.097813][T13510] encrypted_key: master key parameter '' is invalid 11:24:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:43 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 367.483014][T13527] IPVS: ftp: loaded support on port[0] = 21 [ 367.489525][ T2867] device bridge_slave_1 left promiscuous mode [ 367.495741][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.539440][ T2867] device bridge_slave_0 left promiscuous mode [ 367.545693][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.890390][ T2867] device hsr_slave_1 left promiscuous mode [ 368.971516][ T2867] device hsr_slave_0 left promiscuous mode [ 369.032009][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 369.044849][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 369.054952][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 369.111998][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 369.194582][ T2867] bond0 (unregistering): Released all slaves [ 369.335043][T13527] chnl_net:caif_netlink_parms(): no params data found [ 369.358242][T13527] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.365890][T13527] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.373595][T13527] device bridge_slave_0 entered promiscuous mode [ 369.382082][T13527] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.389253][T13527] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.397071][T13527] device bridge_slave_1 entered promiscuous mode [ 369.418244][T13527] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 369.430060][T13527] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 369.444906][T13527] team0: Port device team_slave_0 added [ 369.452108][T13527] team0: Port device team_slave_1 added [ 369.500712][T13527] device hsr_slave_0 entered promiscuous mode [ 369.558795][T13527] device hsr_slave_1 entered promiscuous mode [ 369.663583][T13527] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.670741][T13527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.678081][T13527] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.685207][T13527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.724263][T13527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 369.737049][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 369.746112][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.755435][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.770732][T13527] 8021q: adding VLAN 0 to HW filter on device team0 [ 369.782062][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 369.791294][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.798416][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.822066][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.831684][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.838895][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.847529][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 369.858274][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 369.873540][T13527] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 369.885331][T13527] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 369.898702][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 369.906525][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.915822][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.935873][T13527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 369.945075][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 370.043474][T13534] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:47 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 370.132972][T13542] encrypted_key: master key parameter '' is invalid 11:24:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:47 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 370.423157][T13563] encrypted_key: master key parameter '' is invalid 11:24:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:48 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:48 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 370.772170][T13578] encrypted_key: master key parameter '' is invalid 11:24:48 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:48 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:48 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 371.012307][T13597] encrypted_key: master key parameter '' is invalid 11:24:48 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:48 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:48 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:48 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:48 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:48 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:48 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 371.353620][T13621] encrypted_key: master key parameter '' is invalid 11:24:48 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 372.729067][T13641] IPVS: ftp: loaded support on port[0] = 21 [ 372.826049][ T2867] device bridge_slave_1 left promiscuous mode [ 372.832598][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.869279][ T2867] device bridge_slave_0 left promiscuous mode [ 372.875599][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.241195][ T2867] device hsr_slave_1 left promiscuous mode [ 374.283532][ T2867] device hsr_slave_0 left promiscuous mode [ 374.322992][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 374.333728][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 374.344660][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 374.385922][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 374.464368][ T2867] bond0 (unregistering): Released all slaves [ 374.574332][T13641] chnl_net:caif_netlink_parms(): no params data found [ 374.596607][T13641] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.603844][T13641] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.611519][T13641] device bridge_slave_0 entered promiscuous mode [ 374.619346][T13641] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.626448][T13641] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.634200][T13641] device bridge_slave_1 entered promiscuous mode [ 374.648068][T13641] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 374.658018][T13641] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 374.678476][T13641] team0: Port device team_slave_0 added [ 374.685221][T13641] team0: Port device team_slave_1 added [ 374.721290][T13641] device hsr_slave_0 entered promiscuous mode [ 374.779655][T13641] device hsr_slave_1 entered promiscuous mode [ 374.849323][T13641] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.856414][T13641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.863826][T13641] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.870903][T13641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.944795][T13641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 374.957949][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 374.971157][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.981770][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.993243][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 375.008782][T13641] 8021q: adding VLAN 0 to HW filter on device team0 [ 375.020541][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 375.029163][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.036333][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.061462][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 375.071243][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.078296][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.087105][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 375.097405][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 375.111071][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 375.127396][T13641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 375.144249][T13641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 375.153613][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 375.167303][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 375.187122][T13641] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:52 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 375.305372][T13649] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 375.405476][T13659] encrypted_key: master key parameter '' is invalid 11:24:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:52 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 375.715180][T13680] encrypted_key: master key parameter '' is invalid 11:24:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:53 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 376.035841][T13690] encrypted_key: master key parameter '' is invalid 11:24:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 376.383684][T13714] encrypted_key: master key parameter '' is invalid 11:24:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:53 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="c0dca5055e0b") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 376.634785][T13735] encrypted_key: master key parameter '' is invalid [ 377.984484][T13752] IPVS: ftp: loaded support on port[0] = 21 [ 378.083962][ T2867] device bridge_slave_1 left promiscuous mode [ 378.094835][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.159304][ T2867] device bridge_slave_0 left promiscuous mode [ 378.165502][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.511088][ T2867] device hsr_slave_1 left promiscuous mode [ 379.552787][ T2867] device hsr_slave_0 left promiscuous mode [ 379.592818][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 379.603731][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 379.615804][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 379.673576][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 379.754522][ T2867] bond0 (unregistering): Released all slaves [ 379.853048][T13752] chnl_net:caif_netlink_parms(): no params data found [ 379.875212][T13752] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.883026][T13752] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.890663][T13752] device bridge_slave_0 entered promiscuous mode [ 379.898114][T13752] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.905309][T13752] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.912946][T13752] device bridge_slave_1 entered promiscuous mode [ 379.933195][T13752] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 379.943334][T13752] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 379.959739][T13752] team0: Port device team_slave_0 added [ 379.966443][T13752] team0: Port device team_slave_1 added [ 380.030965][T13752] device hsr_slave_0 entered promiscuous mode [ 380.069007][T13752] device hsr_slave_1 entered promiscuous mode [ 380.139737][T13752] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.146920][T13752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.154307][T13752] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.161469][T13752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.190876][T13752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 380.204408][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 380.214019][ T7764] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.221920][ T7764] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.230262][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 380.280695][T13752] 8021q: adding VLAN 0 to HW filter on device team0 [ 380.292254][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 380.308846][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.315936][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.341610][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.351284][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.358425][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.373595][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 380.384067][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 380.396980][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.412926][T13752] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 380.429627][T13752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 380.438901][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 380.446720][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 380.465964][T13752] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 380.570926][T13760] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:24:57 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="c0dca5055e0b") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:57 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 380.675778][T13766] encrypted_key: master key parameter '' is invalid 11:24:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:57 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:58 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="c0dca5055e0b") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 380.957797][T13787] encrypted_key: master key parameter '' is invalid 11:24:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:58 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="c0") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 381.307968][T13803] encrypted_key: master key parameter '' is invalid 11:24:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:58 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="c0") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 381.645685][T13823] encrypted_key: master key parameter '' is invalid 11:24:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:24:59 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:59 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="c0") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:24:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:24:59 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:59 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 381.974263][T13850] encrypted_key: master key parameter '' is invalid 11:24:59 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 383.364813][T13866] IPVS: ftp: loaded support on port[0] = 21 [ 383.464831][T13866] chnl_net:caif_netlink_parms(): no params data found [ 383.487912][T13866] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.495186][T13866] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.503474][T13866] device bridge_slave_0 entered promiscuous mode [ 383.557734][T13866] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.565218][T13866] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.573218][T13866] device bridge_slave_1 entered promiscuous mode [ 383.589239][T13866] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 383.648212][T13866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 383.665719][T13866] team0: Port device team_slave_0 added [ 383.673130][T13866] team0: Port device team_slave_1 added [ 383.679739][ T2867] device bridge_slave_1 left promiscuous mode [ 383.685912][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.729748][ T2867] device bridge_slave_0 left promiscuous mode [ 383.735969][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.101101][ T2867] device hsr_slave_1 left promiscuous mode [ 385.142981][ T2867] device hsr_slave_0 left promiscuous mode [ 385.183107][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 385.194429][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 385.205801][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 385.271929][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 385.354060][ T2867] bond0 (unregistering): Released all slaves [ 385.531021][T13866] device hsr_slave_0 entered promiscuous mode [ 385.568900][T13866] device hsr_slave_1 entered promiscuous mode [ 385.636858][T13866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 385.647962][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 385.656983][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 385.667375][T13866] 8021q: adding VLAN 0 to HW filter on device team0 [ 385.677505][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 385.686153][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 385.694678][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.701801][ T7758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.709993][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 385.724573][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 385.733177][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 385.742003][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.749104][ T7758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.759455][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 385.770702][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 385.830250][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 385.843710][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 385.865922][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 385.873895][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 385.889706][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 385.902286][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 385.911443][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 385.920070][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 385.930068][T13866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 385.955279][T13866] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:03 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 386.067301][T13874] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 386.155544][T13881] encrypted_key: master key parameter '' is invalid 11:25:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:03 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 386.458226][T13901] encrypted_key: master key parameter '' is invalid 11:25:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:03 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 386.775628][T13916] encrypted_key: master key parameter '' is invalid 11:25:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:04 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 387.020949][T13936] encrypted_key: master key parameter '' is invalid 11:25:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:04 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 387.290384][T13953] encrypted_key: master key parameter '' is invalid 11:25:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 388.784324][T13978] IPVS: ftp: loaded support on port[0] = 21 [ 388.883663][T13978] chnl_net:caif_netlink_parms(): no params data found [ 388.906528][T13978] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.913773][T13978] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.921700][T13978] device bridge_slave_0 entered promiscuous mode [ 388.976803][T13978] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.984063][T13978] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.991991][T13978] device bridge_slave_1 entered promiscuous mode [ 389.056185][T13978] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 389.066462][T13978] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 389.083714][T13978] team0: Port device team_slave_0 added [ 389.091120][T13978] team0: Port device team_slave_1 added [ 389.190086][T13978] device hsr_slave_0 entered promiscuous mode [ 389.228852][T13978] device hsr_slave_1 entered promiscuous mode [ 389.284193][ T2867] device bridge_slave_1 left promiscuous mode [ 389.290803][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.350916][ T2867] device bridge_slave_0 left promiscuous mode [ 389.357114][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.730828][ T2867] device hsr_slave_1 left promiscuous mode [ 390.781147][ T2867] device hsr_slave_0 left promiscuous mode [ 390.841558][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 390.853687][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 390.864395][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 390.904833][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 390.984871][ T2867] bond0 (unregistering): Released all slaves [ 391.105900][T13978] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.113132][T13978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.120504][T13978] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.127607][T13978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.136805][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.144512][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.174667][T13978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 391.185700][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 391.194415][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.205821][T13978] 8021q: adding VLAN 0 to HW filter on device team0 [ 391.215023][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 391.224279][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 391.232636][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.239721][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.259413][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 391.267958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 391.276590][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.283701][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.292183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 391.301433][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 391.310030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 391.318542][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 391.326813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 391.335557][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 391.344916][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 391.355277][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 391.364203][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 391.375349][T13978] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 391.388133][T13978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 391.396890][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 391.405800][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 391.486718][T13978] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 391.601700][T13986] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:08 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 391.713701][T13996] encrypted_key: master key parameter '' is invalid 11:25:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:09 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 391.946609][T14013] encrypted_key: master key parameter '' is invalid 11:25:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 392.387296][T14030] encrypted_key: master key parameter '' is invalid 11:25:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 392.658183][T14048] encrypted_key: master key parameter '' is invalid 11:25:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:10 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:10 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:10 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:10 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:10 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 393.024214][T14070] encrypted_key: master key parameter '' is invalid 11:25:10 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 394.376425][T14091] IPVS: ftp: loaded support on port[0] = 21 [ 394.475142][T14091] chnl_net:caif_netlink_parms(): no params data found [ 394.547479][T14091] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.555164][T14091] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.562802][T14091] device bridge_slave_0 entered promiscuous mode [ 394.618104][T14091] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.625422][T14091] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.633419][T14091] device bridge_slave_1 entered promiscuous mode [ 394.647593][T14091] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 394.657861][T14091] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 394.720634][T14091] team0: Port device team_slave_0 added [ 394.727303][T14091] team0: Port device team_slave_1 added [ 394.811148][T14091] device hsr_slave_0 entered promiscuous mode [ 394.869042][T14091] device hsr_slave_1 entered promiscuous mode [ 394.994905][T14091] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.002120][T14091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.009504][T14091] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.016552][T14091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.039376][ T2867] device bridge_slave_1 left promiscuous mode [ 395.045598][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.089376][ T2867] device bridge_slave_0 left promiscuous mode [ 395.096312][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.452615][ T2867] device hsr_slave_1 left promiscuous mode [ 396.512918][ T2867] device hsr_slave_0 left promiscuous mode [ 396.572621][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 396.583385][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 396.593839][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 396.633411][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 396.694328][ T2867] bond0 (unregistering): Released all slaves [ 396.789233][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.796794][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.808221][T14091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 396.820152][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 396.827861][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 396.837465][T14091] 8021q: adding VLAN 0 to HW filter on device team0 [ 396.846472][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 396.855446][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 396.864139][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.871240][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.881801][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 396.890598][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 396.899072][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.906097][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.925075][T14091] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 396.935926][T14091] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 396.949472][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 396.957892][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 396.966401][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 396.975318][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 396.983582][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 396.992082][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 397.000355][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 397.008651][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.016755][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 397.025011][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.033229][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 397.040942][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 397.133800][T14091] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 397.226056][T14099] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:14 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 397.348172][T14102] encrypted_key: master key parameter '' is invalid 11:25:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:14 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x0, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 397.656595][T14128] encrypted_key: master key parameter '' is invalid 11:25:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:15 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x0, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 398.030741][T14145] encrypted_key: master key parameter '' is invalid 11:25:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x0, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 398.297363][T14163] encrypted_key: master key parameter '' is invalid 11:25:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:15 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 398.614026][T14187] encrypted_key: master key parameter '' is invalid [ 399.991736][T14204] IPVS: ftp: loaded support on port[0] = 21 [ 400.093196][T14204] chnl_net:caif_netlink_parms(): no params data found [ 400.117448][T14204] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.125308][T14204] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.132974][T14204] device bridge_slave_0 entered promiscuous mode [ 400.190525][T14204] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.197717][T14204] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.207593][T14204] device bridge_slave_1 entered promiscuous mode [ 400.273063][T14204] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 400.282719][T14204] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 400.299337][T14204] team0: Port device team_slave_0 added [ 400.354526][T14204] team0: Port device team_slave_1 added [ 400.390206][T14204] device hsr_slave_0 entered promiscuous mode [ 400.439511][T14204] device hsr_slave_1 entered promiscuous mode [ 400.509357][ T2867] device bridge_slave_1 left promiscuous mode [ 400.515612][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.582251][ T2867] device bridge_slave_0 left promiscuous mode [ 400.588679][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.951185][ T2867] device hsr_slave_1 left promiscuous mode [ 401.992988][ T2867] device hsr_slave_0 left promiscuous mode [ 402.061534][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 402.074202][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 402.085543][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 402.152307][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 402.235099][ T2867] bond0 (unregistering): Released all slaves [ 402.327530][T14204] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.334750][T14204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.342199][T14204] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.349354][T14204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.358879][ T7758] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.368485][ T7758] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.400008][T14204] 8021q: adding VLAN 0 to HW filter on device bond0 [ 402.411016][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.419309][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.429775][T14204] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.439827][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 402.449167][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.457446][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.464539][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.474677][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.483542][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.492247][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.499471][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.568535][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 402.577119][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 402.590835][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 402.601996][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 402.613763][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 402.624859][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 402.642713][T14204] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 402.659420][T14204] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 402.676582][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 402.685274][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 402.700393][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.714042][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.722958][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.745550][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.760200][T14204] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.879455][T14212] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 402.985030][T14222] encrypted_key: master key parameter '' is invalid 11:25:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 403.171581][T14239] encrypted_key: master key parameter '' is invalid 11:25:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 403.586375][T14255] encrypted_key: master key parameter '' is invalid 11:25:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:20 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x0, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 403.737382][T14264] encrypted_key: master key parameter '' is invalid 11:25:21 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:21 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:21 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:21 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x0, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:21 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:21 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 404.062991][T14290] encrypted_key: master key parameter '' is invalid 11:25:21 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 405.466354][T14309] IPVS: ftp: loaded support on port[0] = 21 [ 405.565453][T14309] chnl_net:caif_netlink_parms(): no params data found [ 405.577307][ T2867] device bridge_slave_1 left promiscuous mode [ 405.585167][ T2867] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.629550][ T2867] device bridge_slave_0 left promiscuous mode [ 405.635754][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.001184][ T2867] device hsr_slave_1 left promiscuous mode [ 407.043071][ T2867] device hsr_slave_0 left promiscuous mode [ 407.102626][ T2867] team0 (unregistering): Port device team_slave_1 removed [ 407.113405][ T2867] team0 (unregistering): Port device team_slave_0 removed [ 407.125046][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 407.164090][ T2867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 407.244167][ T2867] bond0 (unregistering): Released all slaves [ 407.369077][T14309] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.376247][T14309] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.384275][T14309] device bridge_slave_0 entered promiscuous mode [ 407.392081][T14309] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.399434][T14309] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.407037][T14309] device bridge_slave_1 entered promiscuous mode [ 407.422164][T14309] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 407.431964][T14309] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 407.448429][T14309] team0: Port device team_slave_0 added [ 407.455403][T14309] team0: Port device team_slave_1 added [ 407.511333][T14309] device hsr_slave_0 entered promiscuous mode [ 407.578961][T14309] device hsr_slave_1 entered promiscuous mode [ 407.663736][T14309] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.670958][T14309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.678293][T14309] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.685404][T14309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.735188][T14309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 407.752762][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 407.766923][ T7764] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.775066][ T7764] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.788019][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 407.806380][T14309] 8021q: adding VLAN 0 to HW filter on device team0 [ 407.817899][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 407.827385][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.834499][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.852032][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 407.860580][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.867622][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.895498][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 407.904605][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 407.918286][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 407.933817][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 407.943493][T14309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 407.956590][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 407.983037][T14309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 408.121847][T14317] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000180)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:25 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x0, 0xfffffffffffffff7, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 408.221435][T14321] encrypted_key: master key parameter '' is invalid 11:25:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000180)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:25 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0x0, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 408.701702][T14363] encrypted_key: master key parameter '' is invalid 11:25:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:26 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0x0, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000180)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 408.930659][T14377] encrypted_key: master key parameter '' is invalid 11:25:26 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:26 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0x0, 0x400, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:26 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 409.249646][T14401] encrypted_key: master key parameter '' is invalid 11:25:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:26 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x0, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 409.454416][T14420] encrypted_key: master key parameter '' is invalid [ 410.703378][T14427] IPVS: ftp: loaded support on port[0] = 21 [ 410.804171][T14427] chnl_net:caif_netlink_parms(): no params data found [ 410.815124][ T44] device bridge_slave_1 left promiscuous mode [ 410.823716][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.869395][ T44] device bridge_slave_0 left promiscuous mode [ 410.875566][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.230955][ T44] device hsr_slave_1 left promiscuous mode [ 412.272994][ T44] device hsr_slave_0 left promiscuous mode [ 412.312964][ T44] team0 (unregistering): Port device team_slave_1 removed [ 412.323914][ T44] team0 (unregistering): Port device team_slave_0 removed [ 412.335417][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 412.382152][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 412.455446][ T44] bond0 (unregistering): Released all slaves [ 412.564708][T14427] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.572120][T14427] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.580724][T14427] device bridge_slave_0 entered promiscuous mode [ 412.588517][T14427] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.595811][T14427] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.603988][T14427] device bridge_slave_1 entered promiscuous mode [ 412.619114][T14427] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 412.629224][T14427] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 412.647113][T14427] team0: Port device team_slave_0 added [ 412.657335][T14427] team0: Port device team_slave_1 added [ 412.720138][T14427] device hsr_slave_0 entered promiscuous mode [ 412.789017][T14427] device hsr_slave_1 entered promiscuous mode [ 412.847212][T14427] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.854703][T14427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.862099][T14427] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.869321][T14427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.900466][T14427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 412.913314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 412.922294][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.930540][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.939323][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 412.990953][T14427] 8021q: adding VLAN 0 to HW filter on device team0 [ 413.007599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 413.016987][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.024126][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.054942][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 413.064953][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.072218][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.087167][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 413.110874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 413.124066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 413.132866][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 413.147105][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 413.157736][T14427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 413.186463][T14427] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:30 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:30 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:30 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x0, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 413.321719][T14435] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 413.395699][T14440] encrypted_key: master key parameter '' is invalid 11:25:30 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:30 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x0, 0x8000, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:30 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 413.593386][T14456] encrypted_key: master key parameter '' is invalid 11:25:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400, 0x0, r0}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 414.067370][T14475] encrypted_key: master key parameter '' is invalid 11:25:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 414.289122][T14497] encrypted_key: master key parameter '' is invalid 11:25:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:31 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 414.612726][T14517] encrypted_key: master key parameter '' is invalid [ 416.000473][T14537] IPVS: ftp: loaded support on port[0] = 21 [ 416.055299][T14537] chnl_net:caif_netlink_parms(): no params data found [ 416.124250][T14537] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.131730][T14537] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.139707][T14537] device bridge_slave_0 entered promiscuous mode [ 416.148054][T14537] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.155627][T14537] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.163541][T14537] device bridge_slave_1 entered promiscuous mode [ 416.225364][T14537] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 416.236080][T14537] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 416.253210][T14537] team0: Port device team_slave_0 added [ 416.259468][ T44] device bridge_slave_1 left promiscuous mode [ 416.265646][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.309395][ T44] device bridge_slave_0 left promiscuous mode [ 416.315854][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.700301][ T44] device hsr_slave_1 left promiscuous mode [ 417.772971][ T44] device hsr_slave_0 left promiscuous mode [ 417.833003][ T44] team0 (unregistering): Port device team_slave_1 removed [ 417.844273][ T44] team0 (unregistering): Port device team_slave_0 removed [ 417.856568][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 417.894276][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 417.985298][ T44] bond0 (unregistering): Released all slaves [ 418.091979][T14537] team0: Port device team_slave_1 added [ 418.150456][T14537] device hsr_slave_0 entered promiscuous mode [ 418.209022][T14537] device hsr_slave_1 entered promiscuous mode [ 418.275450][T14537] 8021q: adding VLAN 0 to HW filter on device bond0 [ 418.287297][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 418.296398][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 418.306587][T14537] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.317985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.327015][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.335936][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.343726][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.352516][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 418.364734][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.373426][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.382262][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.389665][ T7758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.460002][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 418.479715][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 418.489473][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 418.498300][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 418.507254][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 418.522690][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 418.533359][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 418.549698][T14537] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 418.562334][T14537] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 418.571925][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 418.581172][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 418.601397][T14537] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:35 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:35 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 418.702677][T14545] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:35 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x0, 0x0, 0x0) 11:25:35 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 418.800200][T14554] encrypted_key: master key parameter '' is invalid 11:25:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x0, 0x0, 0x0) 11:25:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 419.036421][T14573] encrypted_key: master key parameter '' is invalid 11:25:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x0, 0x0, 0x0) 11:25:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 419.477833][T14590] encrypted_key: master key parameter '' is invalid 11:25:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x0, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 419.736828][T14609] encrypted_key: master key parameter '' is invalid 11:25:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:37 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:37 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:37 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x0, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:37 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:37 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 420.026889][T14632] encrypted_key: master key parameter '' is invalid 11:25:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:37 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 421.469550][T14654] IPVS: ftp: loaded support on port[0] = 21 [ 421.524142][T14654] chnl_net:caif_netlink_parms(): no params data found [ 421.596608][T14654] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.604605][T14654] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.612546][T14654] device bridge_slave_0 entered promiscuous mode [ 421.620719][ T44] device bridge_slave_1 left promiscuous mode [ 421.626919][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.669630][ T44] device bridge_slave_0 left promiscuous mode [ 421.676104][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.051085][ T44] device hsr_slave_1 left promiscuous mode [ 423.092988][ T44] device hsr_slave_0 left promiscuous mode [ 423.141357][ T44] team0 (unregistering): Port device team_slave_1 removed [ 423.153612][ T44] team0 (unregistering): Port device team_slave_0 removed [ 423.164090][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 423.203367][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 423.294142][ T44] bond0 (unregistering): Released all slaves [ 423.402664][T14654] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.409872][T14654] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.417392][T14654] device bridge_slave_1 entered promiscuous mode [ 423.434202][T14654] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 423.444051][T14654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 423.459200][T14654] team0: Port device team_slave_0 added [ 423.466484][T14654] team0: Port device team_slave_1 added [ 423.520112][T14654] device hsr_slave_0 entered promiscuous mode [ 423.568944][T14654] device hsr_slave_1 entered promiscuous mode [ 423.638134][T14654] 8021q: adding VLAN 0 to HW filter on device bond0 [ 423.650224][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 423.661885][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 423.670042][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 423.720877][T14654] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.736233][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 423.746335][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 423.760058][ T3001] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.767157][ T3001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.792126][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 423.801984][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 423.814297][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 423.827767][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.834883][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.849115][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 423.857736][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 423.872289][T14654] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 423.884632][T14654] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 423.900035][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 423.907831][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 423.917246][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 423.936135][T14654] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 423.952390][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 424.067527][T14662] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:41 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620", 0xb, 0xfffffffffffffffe) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x0, 0x5, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0x400}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x0, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:41 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 424.170716][T14670] encrypted_key: master key parameter '' is invalid 11:25:41 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:41 executing program 5: semop(0x0, &(0x7f0000000000)=[{0x3, 0x1, 0x800}, {0x1, 0xcf, 0x800}, {0x4, 0x1, 0x1000}, {0x3, 0x8, 0x800}, {0x5, 0x8, 0x1800}, {0x2, 0x200, 0x800}], 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:25:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:41 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:41 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x2000) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:42 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x2000) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:42 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x2000) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:42 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x2000) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:42 executing program 5: mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 426.712360][T14772] IPVS: ftp: loaded support on port[0] = 21 [ 426.762939][T14772] chnl_net:caif_netlink_parms(): no params data found [ 426.834203][T14772] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.841476][T14772] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.849294][T14772] device bridge_slave_0 entered promiscuous mode [ 426.856633][T14772] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.863791][T14772] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.871344][T14772] device bridge_slave_1 entered promiscuous mode [ 426.881735][ T44] device bridge_slave_1 left promiscuous mode [ 426.887906][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.929651][ T44] device bridge_slave_0 left promiscuous mode [ 426.935841][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.300800][ T44] device hsr_slave_1 left promiscuous mode [ 428.341709][ T44] device hsr_slave_0 left promiscuous mode [ 428.393007][ T44] team0 (unregistering): Port device team_slave_1 removed [ 428.403628][ T44] team0 (unregistering): Port device team_slave_0 removed [ 428.415046][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 428.442174][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 428.524278][ T44] bond0 (unregistering): Released all slaves [ 428.596721][T14772] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 428.606988][T14772] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 428.627990][T14772] team0: Port device team_slave_0 added [ 428.634933][T14772] team0: Port device team_slave_1 added [ 428.690638][T14772] device hsr_slave_0 entered promiscuous mode [ 428.738886][T14772] device hsr_slave_1 entered promiscuous mode [ 428.819427][T14772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 428.829994][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 428.839451][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 428.846999][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 428.857566][T14772] 8021q: adding VLAN 0 to HW filter on device team0 [ 428.869983][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 428.879650][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 428.887954][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.895120][ T7758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 428.903266][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 428.911850][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 428.920162][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.927207][ T7758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 428.935098][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 428.985003][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 429.011323][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 429.028805][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 429.045644][T14772] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 429.062018][T14772] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 429.076411][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 429.088270][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 429.102267][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 429.112630][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 429.134756][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 429.147891][T14772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 429.266620][T14780] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:46 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:46 executing program 5: mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:46 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:46 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:46 executing program 5: mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:46 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:46 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:46 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:46 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:47 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x2000) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:47 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x2000) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:47 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x2000) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:47 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:47 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 431.845228][T14882] IPVS: ftp: loaded support on port[0] = 21 [ 431.933448][T14882] chnl_net:caif_netlink_parms(): no params data found [ 432.004731][T14882] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.012061][T14882] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.019681][T14882] device bridge_slave_0 entered promiscuous mode [ 432.027224][T14882] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.034725][T14882] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.042378][T14882] device bridge_slave_1 entered promiscuous mode [ 432.050912][ T44] device bridge_slave_1 left promiscuous mode [ 432.057192][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.089663][ T44] device bridge_slave_0 left promiscuous mode [ 432.095854][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.451105][ T44] device hsr_slave_1 left promiscuous mode [ 433.492822][ T44] device hsr_slave_0 left promiscuous mode [ 433.552892][ T44] team0 (unregistering): Port device team_slave_1 removed [ 433.563783][ T44] team0 (unregistering): Port device team_slave_0 removed [ 433.575486][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 433.633277][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 433.715156][ T44] bond0 (unregistering): Released all slaves [ 433.841219][T14882] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 433.851547][T14882] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 433.866570][T14882] team0: Port device team_slave_0 added [ 433.873577][T14882] team0: Port device team_slave_1 added [ 433.920199][T14882] device hsr_slave_0 entered promiscuous mode [ 433.969010][T14882] device hsr_slave_1 entered promiscuous mode [ 434.051020][T14882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 434.065229][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 434.075203][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 434.083335][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.131961][T14882] 8021q: adding VLAN 0 to HW filter on device team0 [ 434.147951][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 434.157098][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.172055][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.179169][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.201551][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 434.213512][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 434.223463][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.236836][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.243968][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.257661][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 434.276856][T14882] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 434.288033][T14882] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 434.301654][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 434.316212][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 434.325210][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.341184][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.363502][T14882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 434.371265][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 434.379754][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 434.485577][T14890] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:25:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:51 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:51 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:25:51 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:51 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:51 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 11:25:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:51 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:51 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:51 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:51 executing program 5: 11:25:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:52 executing program 5: 11:25:52 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000100)="2b0f6e66142927108ecc60ed31e68814ee0b833da177dd", 0x17}]) syz_read_part_table(0x0, 0xaaaaaaaaaaaac04, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 11:25:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 435.597989][T14949] ldm_validate_privheads(): Disk read failed. [ 435.650416][T14949] loop5: p1 < > [ 435.654029][T14949] loop5: partition table partially beyond EOD, truncated [ 435.743694][T14949] loop5: p1 start 1 is beyond EOD, truncated 11:25:53 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000100)="2b0f6e66142927108ecc60ed31e68814ee0b833da177dd", 0x17}]) syz_read_part_table(0x0, 0xaaaaaaaaaaaac04, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 11:25:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 436.209523][T15000] ldm_validate_privheads(): Disk read failed. [ 436.215802][T15000] loop5: p1 < > [ 436.219988][T15000] loop5: partition table partially beyond EOD, truncated [ 436.227171][T15000] loop5: p1 start 1 is beyond EOD, truncated [ 436.954481][T15009] IPVS: ftp: loaded support on port[0] = 21 [ 437.052106][T15009] chnl_net:caif_netlink_parms(): no params data found [ 437.120373][T15009] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.127502][T15009] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.135255][T15009] device bridge_slave_0 entered promiscuous mode [ 437.143223][ T44] device bridge_slave_1 left promiscuous mode [ 437.149947][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.189644][ T44] device bridge_slave_0 left promiscuous mode [ 437.195845][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.551399][ T44] device hsr_slave_1 left promiscuous mode [ 438.613046][ T44] device hsr_slave_0 left promiscuous mode [ 438.681885][ T44] team0 (unregistering): Port device team_slave_1 removed [ 438.693978][ T44] team0 (unregistering): Port device team_slave_0 removed [ 438.704803][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 438.742685][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 438.823994][ T44] bond0 (unregistering): Released all slaves [ 438.902621][T15009] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.909853][T15009] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.917440][T15009] device bridge_slave_1 entered promiscuous mode [ 438.934646][T15009] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 438.945140][T15009] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 438.960459][T15009] team0: Port device team_slave_0 added [ 438.967022][T15009] team0: Port device team_slave_1 added [ 439.020999][T15009] device hsr_slave_0 entered promiscuous mode [ 439.078779][T15009] device hsr_slave_1 entered promiscuous mode [ 439.179302][T15009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 439.190626][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 439.201735][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 439.209784][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 439.280646][T15009] 8021q: adding VLAN 0 to HW filter on device team0 [ 439.295753][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 439.305028][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 439.318208][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.325316][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.350059][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 439.357922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 439.367077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 439.380906][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.387961][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.401753][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 439.424456][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 439.434938][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 439.446069][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 439.462072][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 439.474664][T15009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 439.504163][T15009] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', 0x0, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:56 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:56 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:56 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:56 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000100)="2b0f6e66142927108ecc60ed31e68814ee0b833da177dd", 0x17}]) syz_read_part_table(0x0, 0xaaaaaaaaaaaac04, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 11:25:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:56 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:56 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:56 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 439.907893][T15030] ldm_validate_privheads(): Disk read failed. [ 439.928479][T15030] loop5: p1 < > 11:25:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 439.997721][T15030] loop5: partition table partially beyond EOD, truncated [ 440.048911][T15030] loop5: p1 start 1 is beyond EOD, truncated 11:25:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', 0x0, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:57 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:57 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000100)="2b0f6e66142927108ecc60ed31e68814ee0b833da177dd", 0x17}]) syz_read_part_table(0x0, 0xaaaaaaaaaaaac04, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 11:25:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:57 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', 0x0, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 440.623539][T15074] ldm_validate_privheads(): Disk read failed. [ 440.687403][T15074] loop5: p1 < > 11:25:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:57 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 440.717545][T15074] loop5: partition table partially beyond EOD, truncated [ 440.754286][T15074] loop5: p1 start 1 is beyond EOD, truncated 11:25:58 executing program 5: syz_read_part_table(0x0, 0xaaaaaaaaaaaac04, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 11:25:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:25:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:25:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:25:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:25:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 441.259667][T15123] ldm_validate_privheads(): Disk read failed. [ 441.266137][T15123] loop5: p1 < > [ 441.300792][T15123] loop5: partition table partially beyond EOD, truncated [ 441.324254][T15123] loop5: p1 start 1 is beyond EOD, truncated [ 442.425474][T15136] IPVS: ftp: loaded support on port[0] = 21 [ 442.526702][T15136] chnl_net:caif_netlink_parms(): no params data found [ 442.550196][T15136] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.557400][T15136] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.565100][T15136] device bridge_slave_0 entered promiscuous mode [ 442.619940][T15136] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.627108][T15136] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.635146][T15136] device bridge_slave_1 entered promiscuous mode [ 442.649150][T15136] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 442.659070][T15136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 442.676120][T15136] team0: Port device team_slave_0 added [ 442.682700][ T44] device bridge_slave_1 left promiscuous mode [ 442.688971][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.729253][ T44] device bridge_slave_0 left promiscuous mode [ 442.735430][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.090283][ T44] device hsr_slave_1 left promiscuous mode [ 444.142786][ T44] device hsr_slave_0 left promiscuous mode [ 444.202769][ T44] team0 (unregistering): Port device team_slave_1 removed [ 444.213492][ T44] team0 (unregistering): Port device team_slave_0 removed [ 444.224042][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 444.272306][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 444.355310][ T44] bond0 (unregistering): Released all slaves [ 444.433178][T15136] team0: Port device team_slave_1 added [ 444.481436][T15136] device hsr_slave_0 entered promiscuous mode [ 444.528820][T15136] device hsr_slave_1 entered promiscuous mode [ 444.604776][T15136] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.616608][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 444.625104][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.635546][T15136] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.647688][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 444.656313][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.664794][ T3001] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.671920][ T3001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.680373][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 444.689011][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.697256][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.704347][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.713208][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 444.725916][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 444.734487][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 444.753536][T15136] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 444.764175][T15136] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 444.776083][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 444.785012][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 444.793839][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 444.802461][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 444.810875][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.819129][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.827427][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 444.835576][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 444.893288][T15136] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:02 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:02 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:02 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:02 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 11:26:02 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:02 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:02 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:02 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 11:26:02 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:02 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:02 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:02 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 11:26:02 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:03 executing program 5: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 11:26:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:03 executing program 5: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 11:26:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 447.821981][T15255] IPVS: ftp: loaded support on port[0] = 21 [ 447.922336][T15255] chnl_net:caif_netlink_parms(): no params data found [ 447.945595][T15255] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.952842][T15255] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.960695][T15255] device bridge_slave_0 entered promiscuous mode [ 447.968941][ T44] device bridge_slave_1 left promiscuous mode [ 447.975121][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.019483][ T44] device bridge_slave_0 left promiscuous mode [ 448.025709][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.340690][ T44] device hsr_slave_1 left promiscuous mode [ 449.412779][ T44] device hsr_slave_0 left promiscuous mode [ 449.461913][ T44] team0 (unregistering): Port device team_slave_1 removed [ 449.473775][ T44] team0 (unregistering): Port device team_slave_0 removed [ 449.484485][ T44] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 449.522329][ T44] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 449.603994][ T44] bond0 (unregistering): Released all slaves [ 449.691720][T15255] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.699732][T15255] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.707430][T15255] device bridge_slave_1 entered promiscuous mode [ 449.723630][T15255] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 449.733720][T15255] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 449.755315][T15255] team0: Port device team_slave_0 added [ 449.762548][T15255] team0: Port device team_slave_1 added [ 449.821235][T15255] device hsr_slave_0 entered promiscuous mode [ 449.858890][T15255] device hsr_slave_1 entered promiscuous mode [ 449.928172][T15255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 449.938895][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 449.947585][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 449.955753][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 449.965198][T15255] 8021q: adding VLAN 0 to HW filter on device team0 [ 449.975411][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 449.984466][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 449.993155][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.000311][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.010410][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 450.065342][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 450.074641][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.083677][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.090919][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.110268][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.124110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 450.145614][T15255] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 450.156183][T15255] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 450.173577][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 450.183317][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.195919][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.215403][T15255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 450.222973][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 450.330547][T15263] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:26:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:07 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:07 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:07 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:07 executing program 5: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 11:26:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:07 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:07 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:07 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:07 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 11:26:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 450.731235][T15294] Dev loop5: unable to read RDB block 1 [ 450.736962][T15294] loop5: unable to read partition table [ 450.782177][T15294] loop5: partition table beyond EOD, truncated [ 450.808702][T15294] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:08 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 11:26:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 451.080815][T15311] Dev loop5: unable to read RDB block 1 [ 451.086523][T15311] loop5: unable to read partition table [ 451.124538][T15311] loop5: partition table beyond EOD, truncated 11:26:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 451.179281][T15311] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:08 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 11:26:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 451.463337][T15339] Dev loop5: unable to read RDB block 1 11:26:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 451.520827][T15339] loop5: unable to read partition table 11:26:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 451.620754][T15339] loop5: partition table beyond EOD, truncated 11:26:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 451.728704][T15339] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 453.009572][T15373] IPVS: ftp: loaded support on port[0] = 21 [ 453.155506][T15373] chnl_net:caif_netlink_parms(): no params data found [ 453.177291][T15373] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.184792][T15373] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.192514][T15373] device bridge_slave_0 entered promiscuous mode [ 453.249875][T15373] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.257034][T15373] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.267435][T15373] device bridge_slave_1 entered promiscuous mode [ 453.284613][T15373] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 453.294483][T15373] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 453.312988][T15373] team0: Port device team_slave_0 added [ 453.319378][ T21] device bridge_slave_1 left promiscuous mode [ 453.325540][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.369628][ T21] device bridge_slave_0 left promiscuous mode [ 453.375837][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.730135][ T21] device hsr_slave_1 left promiscuous mode [ 454.811404][ T21] device hsr_slave_0 left promiscuous mode [ 454.862891][ T21] team0 (unregistering): Port device team_slave_1 removed [ 454.873694][ T21] team0 (unregistering): Port device team_slave_0 removed [ 454.884182][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 454.932374][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 455.016105][ T21] bond0 (unregistering): Released all slaves [ 455.122820][T15373] team0: Port device team_slave_1 added [ 455.205854][T15373] device hsr_slave_0 entered promiscuous mode [ 455.249062][T15373] device hsr_slave_1 entered promiscuous mode [ 455.316729][T15373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 455.327788][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 455.336806][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 455.347188][T15373] 8021q: adding VLAN 0 to HW filter on device team0 [ 455.358745][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 455.367548][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 455.376105][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.383226][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.398705][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 455.406707][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 455.415647][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 455.424614][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.431776][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.440029][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 455.448701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 455.457248][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 455.465832][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 455.476414][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 455.484373][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 455.492842][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 455.508699][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 455.516868][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.526109][T15373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 455.584790][T15373] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:12 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:12 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:12 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 11:26:12 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:13 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:13 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:13 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 455.845969][T15389] Dev loop5: unable to read RDB block 1 [ 455.868820][T15389] loop5: unable to read partition table 11:26:13 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 455.903586][T15389] loop5: partition table beyond EOD, truncated 11:26:13 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 455.972705][T15389] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:13 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:13 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 11:26:13 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:13 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:13 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:13 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:13 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 456.489029][T15427] Dev loop5: unable to read RDB block 1 [ 456.514450][T15427] loop5: unable to read partition table [ 456.565884][T15427] loop5: partition table beyond EOD, truncated 11:26:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 456.607072][T15427] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:13 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:13 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:13 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 11:26:13 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 456.904400][T15461] Dev loop5: unable to read RDB block 1 [ 456.950797][T15461] loop5: unable to read partition table [ 456.986238][T15461] loop5: partition table beyond EOD, truncated 11:26:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 457.044012][T15461] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:14 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff0700"/32, 0x20, 0x1c0}]) [ 457.319498][T15488] Dev loop5: unable to read RDB block 1 [ 457.325370][T15488] loop5: unable to read partition table [ 457.365360][T15488] loop5: partition table beyond EOD, truncated [ 457.381942][T15488] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 458.469599][T15497] IPVS: ftp: loaded support on port[0] = 21 [ 458.589701][T15497] chnl_net:caif_netlink_parms(): no params data found [ 458.661725][T15497] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.669027][T15497] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.676616][T15497] device bridge_slave_0 entered promiscuous mode [ 458.684748][T15497] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.692033][T15497] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.700261][T15497] device bridge_slave_1 entered promiscuous mode [ 458.763004][T15497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 458.773434][T15497] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 458.789829][T15497] team0: Port device team_slave_0 added [ 458.845091][T15497] team0: Port device team_slave_1 added [ 458.890679][T15497] device hsr_slave_0 entered promiscuous mode [ 458.928785][T15497] device hsr_slave_1 entered promiscuous mode [ 459.021425][T15497] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.028546][T15497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.035828][T15497] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.042919][T15497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.069548][ T21] device bridge_slave_1 left promiscuous mode [ 459.075753][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.109901][ T21] device bridge_slave_0 left promiscuous mode [ 459.116089][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.480803][ T21] device hsr_slave_1 left promiscuous mode [ 460.531524][ T21] device hsr_slave_0 left promiscuous mode [ 460.583406][ T21] team0 (unregistering): Port device team_slave_1 removed [ 460.594284][ T21] team0 (unregistering): Port device team_slave_0 removed [ 460.605051][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 460.643545][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 460.725972][ T21] bond0 (unregistering): Released all slaves [ 460.842618][T15497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 460.850929][ T7764] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.861899][ T7764] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.870453][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 460.886065][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 460.894153][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.904213][T15497] 8021q: adding VLAN 0 to HW filter on device team0 [ 460.913496][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 460.922938][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.931419][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.938515][ T7758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.959795][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 460.969143][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 460.977488][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.984597][ T7758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.992443][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 461.001143][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 461.009676][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 461.018115][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 461.026508][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 461.035164][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 461.043570][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 461.051872][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 461.061330][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 461.071377][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 461.080427][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 461.090766][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 461.164943][T15497] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad", 0x16, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:18 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:18 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:18 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:18 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff0700"/32, 0x20, 0x1c0}]) 11:26:18 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:18 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:18 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 461.428267][T15515] Dev loop5: unable to read RDB block 1 [ 461.463550][T15515] loop5: unable to read partition table [ 461.517304][T15515] loop5: partition table beyond EOD, truncated 11:26:18 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 461.568504][T15515] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad", 0x16, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:19 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:19 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:19 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:19 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff0700"/32, 0x20, 0x1c0}]) 11:26:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:19 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:19 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:19 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 462.079365][T15552] Dev loop5: unable to read RDB block 1 [ 462.085056][T15552] loop5: unable to read partition table 11:26:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 462.172789][T15552] loop5: partition table beyond EOD, truncated [ 462.198448][T15552] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:19 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad", 0x16, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:19 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:19 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:19 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) 11:26:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:19 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:19 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:19 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:19 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:19 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 462.599015][T15586] Dev loop5: unable to read RDB block 1 11:26:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 462.647548][T15586] loop5: unable to read partition table 11:26:19 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 462.718764][T15586] loop5: partition table beyond EOD, truncated [ 462.740988][T15586] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 464.053946][T15614] IPVS: ftp: loaded support on port[0] = 21 [ 464.166463][T15614] chnl_net:caif_netlink_parms(): no params data found [ 464.192190][T15614] bridge0: port 1(bridge_slave_0) entered blocking state [ 464.199409][T15614] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.207109][T15614] device bridge_slave_0 entered promiscuous mode [ 464.214802][T15614] bridge0: port 2(bridge_slave_1) entered blocking state [ 464.222023][T15614] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.229935][T15614] device bridge_slave_1 entered promiscuous mode [ 464.290854][T15614] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 464.301179][T15614] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 464.316104][T15614] team0: Port device team_slave_0 added [ 464.372466][T15614] team0: Port device team_slave_1 added [ 464.420147][T15614] device hsr_slave_0 entered promiscuous mode [ 464.469012][T15614] device hsr_slave_1 entered promiscuous mode [ 464.563753][T15614] bridge0: port 2(bridge_slave_1) entered blocking state [ 464.570974][T15614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 464.578259][T15614] bridge0: port 1(bridge_slave_0) entered blocking state [ 464.585345][T15614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 464.610061][ T21] device bridge_slave_1 left promiscuous mode [ 464.616253][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.669326][ T21] device bridge_slave_0 left promiscuous mode [ 464.675522][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.071279][ T21] device hsr_slave_1 left promiscuous mode [ 466.122839][ T21] device hsr_slave_0 left promiscuous mode [ 466.182708][ T21] team0 (unregistering): Port device team_slave_1 removed [ 466.193487][ T21] team0 (unregistering): Port device team_slave_0 removed [ 466.204948][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 466.263427][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 466.353777][ T21] bond0 (unregistering): Released all slaves [ 466.462877][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.471272][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.488063][T15614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 466.498746][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 466.506345][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 466.516110][T15614] 8021q: adding VLAN 0 to HW filter on device team0 [ 466.525045][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 466.534412][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 466.543926][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.550999][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.569707][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 466.579913][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 466.588304][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.595554][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.603938][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 466.613264][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 466.622072][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 466.630752][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 466.639439][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 466.647789][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 466.656752][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 466.667898][T15614] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 466.678647][T15614] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 466.690871][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 466.699583][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 466.707846][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 466.716258][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 466.724748][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 466.798961][T15614] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98b", 0x21, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:24 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:24 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:24 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) 11:26:24 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 466.905861][T15622] encrypted_key: master key parameter 'j˜0ã›BÚl­' is invalid 11:26:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:24 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:24 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:24 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 467.081811][T15628] Dev loop5: unable to read RDB block 1 [ 467.159448][T15628] loop5: unable to read partition table [ 467.176390][T15628] loop5: partition table beyond EOD, truncated 11:26:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:24 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 467.218783][T15628] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98b", 0x21, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:24 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:24 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:24 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) 11:26:24 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 467.669091][T15662] Dev loop5: unable to read RDB block 1 [ 467.698905][T15662] loop5: unable to read partition table [ 467.717692][T15662] loop5: partition table beyond EOD, truncated 11:26:24 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:24 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:24 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 467.746030][T15662] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:25 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) 11:26:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98b", 0x21, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 467.969676][T15689] Dev loop5: unable to read RDB block 1 [ 468.011510][T15689] loop5: unable to read partition table [ 468.021758][T15689] loop5: partition table beyond EOD, truncated 11:26:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 468.068125][T15689] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:25 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) 11:26:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 468.393267][T15717] Dev loop5: unable to read RDB block 1 [ 468.426340][T15717] loop5: unable to read partition table [ 468.484915][T15717] loop5: partition table beyond EOD, truncated [ 468.539592][T15717] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 469.736766][T15736] IPVS: ftp: loaded support on port[0] = 21 [ 469.834620][T15736] chnl_net:caif_netlink_parms(): no params data found [ 469.908462][T15736] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.915604][T15736] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.923350][T15736] device bridge_slave_0 entered promiscuous mode [ 469.980200][T15736] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.987266][T15736] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.997337][T15736] device bridge_slave_1 entered promiscuous mode [ 470.012423][T15736] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 470.022574][T15736] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 470.090922][T15736] team0: Port device team_slave_0 added [ 470.097511][T15736] team0: Port device team_slave_1 added [ 470.160138][T15736] device hsr_slave_0 entered promiscuous mode [ 470.198846][T15736] device hsr_slave_1 entered promiscuous mode [ 470.318708][T15736] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.325779][T15736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.333232][T15736] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.340343][T15736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.371846][T15736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 470.381532][ T21] device bridge_slave_1 left promiscuous mode [ 470.387710][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.429702][ T21] device bridge_slave_0 left promiscuous mode [ 470.435893][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.830218][ T21] device hsr_slave_1 left promiscuous mode [ 471.872876][ T21] device hsr_slave_0 left promiscuous mode [ 471.922021][ T21] team0 (unregistering): Port device team_slave_1 removed [ 471.933891][ T21] team0 (unregistering): Port device team_slave_0 removed [ 471.945423][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 471.982744][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 472.064778][ T21] bond0 (unregistering): Released all slaves [ 472.147758][T15736] 8021q: adding VLAN 0 to HW filter on device team0 [ 472.156158][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 472.164494][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.172269][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.180961][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 472.193568][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 472.202475][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 472.210893][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.217935][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.229981][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 472.239107][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 472.247399][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.254498][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.262130][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 472.280328][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 472.289397][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 472.297920][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 472.306952][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 472.315481][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 472.323877][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 472.333107][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 472.342081][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 472.388965][T15736] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 472.404881][T15736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 472.413374][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 472.426741][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 472.444621][T15736] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd87", 0x26, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:29 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:29 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:29 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:29 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) [ 472.553635][T15744] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹' is invalid 11:26:29 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 472.679197][T15752] Dev loop5: unable to read RDB block 1 [ 472.684841][T15752] loop5: unable to read partition table 11:26:29 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:29 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 472.721305][T15752] loop5: partition table beyond EOD, truncated [ 472.798587][T15752] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd87", 0x26, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:30 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:30 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:30 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) 11:26:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:30 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:30 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 473.340133][T15793] Dev loop5: unable to read RDB block 1 [ 473.372032][T15793] loop5: unable to read partition table 11:26:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 473.428311][T15793] loop5: partition table beyond EOD, truncated [ 473.461769][T15793] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd87", 0x26, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:30 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:30 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:30 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) 11:26:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:30 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:30 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:31 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:31 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 473.892898][T15831] Dev loop5: unable to read RDB block 1 [ 473.918595][T15831] loop5: unable to read partition table [ 473.948767][T15831] loop5: partition table beyond EOD, truncated 11:26:31 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 473.995197][T15831] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 475.311355][T15854] IPVS: ftp: loaded support on port[0] = 21 [ 475.409890][T15854] chnl_net:caif_netlink_parms(): no params data found [ 475.481031][T15854] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.488111][T15854] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.498193][T15854] device bridge_slave_0 entered promiscuous mode [ 475.506178][T15854] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.513413][T15854] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.521061][T15854] device bridge_slave_1 entered promiscuous mode [ 475.585944][T15854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 475.596034][T15854] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 475.661510][T15854] team0: Port device team_slave_0 added [ 475.668155][T15854] team0: Port device team_slave_1 added [ 475.731161][T15854] device hsr_slave_0 entered promiscuous mode [ 475.778952][T15854] device hsr_slave_1 entered promiscuous mode [ 475.833665][ T21] device bridge_slave_1 left promiscuous mode [ 475.840113][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.869287][ T21] device bridge_slave_0 left promiscuous mode [ 475.875476][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.240273][ T21] device hsr_slave_1 left promiscuous mode [ 477.291239][ T21] device hsr_slave_0 left promiscuous mode [ 477.362962][ T21] team0 (unregistering): Port device team_slave_1 removed [ 477.373712][ T21] team0 (unregistering): Port device team_slave_0 removed [ 477.384122][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 477.432204][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 477.534599][ T21] bond0 (unregistering): Released all slaves [ 477.716816][T15854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 477.726878][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 477.735038][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 477.747089][T15854] 8021q: adding VLAN 0 to HW filter on device team0 [ 477.756793][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 477.765434][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 477.774133][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.781311][ T7758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.789891][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 477.802155][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 477.810943][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 477.819356][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.826392][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.846747][T15854] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 477.857447][T15854] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 477.872003][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 477.881479][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 477.890399][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 477.899612][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 477.907831][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 477.916534][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 477.925167][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 477.933531][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.941929][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 477.950403][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 478.026667][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 478.034725][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 478.049533][T15854] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede", 0x29, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:35 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:35 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:35 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:35 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) [ 478.144436][T15862] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇' is invalid 11:26:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:35 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:35 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:35 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 478.289136][T15871] Dev loop5: unable to read RDB block 1 [ 478.312360][T15871] loop5: unable to read partition table 11:26:35 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 478.371928][T15871] loop5: partition table beyond EOD, truncated [ 478.403978][T15871] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede", 0x29, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:36 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) 11:26:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 478.879022][T15907] Dev loop5: unable to read RDB block 1 [ 478.897170][T15907] loop5: unable to read partition table 11:26:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 478.931477][T15907] loop5: partition table beyond EOD, truncated 11:26:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede", 0x29, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 478.993108][T15907] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:36 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) 11:26:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 479.305402][T15936] Dev loop5: unable to read RDB block 1 [ 479.332964][T15936] loop5: unable to read partition table 11:26:36 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:36 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 479.381368][T15936] loop5: partition table beyond EOD, truncated 11:26:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:36 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 479.456722][T15936] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 480.843787][T15966] IPVS: ftp: loaded support on port[0] = 21 [ 480.941569][T15966] chnl_net:caif_netlink_parms(): no params data found [ 480.964286][T15966] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.971538][T15966] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.979773][T15966] device bridge_slave_0 entered promiscuous mode [ 480.987177][T15966] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.994826][T15966] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.005310][T15966] device bridge_slave_1 entered promiscuous mode [ 481.070439][T15966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 481.080539][T15966] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 481.095364][T15966] team0: Port device team_slave_0 added [ 481.102543][T15966] team0: Port device team_slave_1 added [ 481.200995][T15966] device hsr_slave_0 entered promiscuous mode [ 481.248763][T15966] device hsr_slave_1 entered promiscuous mode [ 481.343117][T15966] bridge0: port 2(bridge_slave_1) entered blocking state [ 481.350255][T15966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 481.357518][T15966] bridge0: port 1(bridge_slave_0) entered blocking state [ 481.364626][T15966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 481.445893][T15966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 481.458239][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 481.466399][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.474293][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.482371][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 481.493929][ T7817] device bridge_slave_1 left promiscuous mode [ 481.500585][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.549681][ T7817] device bridge_slave_0 left promiscuous mode [ 481.555896][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.941173][ T7817] device hsr_slave_1 left promiscuous mode [ 483.003041][ T7817] device hsr_slave_0 left promiscuous mode [ 483.042871][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 483.053292][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 483.063738][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 483.112016][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 483.205015][ T7817] bond0 (unregistering): Released all slaves [ 483.314514][T15966] 8021q: adding VLAN 0 to HW filter on device team0 [ 483.327345][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 483.335870][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 483.344654][ T3001] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.351755][ T3001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.361679][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 483.370423][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 483.378844][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.385904][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.401537][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 483.412055][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 483.421163][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 483.430226][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 483.444353][T15966] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 483.455436][T15966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 483.466803][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 483.475356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 483.484031][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 483.492360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 483.500928][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 483.509308][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 483.517426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 483.525928][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 483.587816][T15966] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83", 0x2a, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:40 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:40 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:40 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) 11:26:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:40 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 483.681536][T15974] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞ' is invalid 11:26:40 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:41 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 483.812121][T15977] Dev loop5: unable to read RDB block 1 [ 483.836094][T15977] loop5: unable to read partition table [ 483.848536][T15977] loop5: partition table beyond EOD, truncated 11:26:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 483.898448][T15977] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83", 0x2a, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:41 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 11:26:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:41 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 484.474487][T16016] Dev loop5: unable to read RDB block 1 [ 484.492125][T16016] loop5: unable to read partition table [ 484.498053][T16016] loop5: partition table beyond EOD, truncated 11:26:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:41 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:41 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 484.544608][T16016] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:41 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 11:26:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83", 0x2a, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r2}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:41 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 484.868232][T16045] Dev loop5: unable to read RDB block 1 [ 484.908470][T16045] loop5: unable to read partition table [ 484.914232][T16045] loop5: partition table beyond EOD, truncated 11:26:42 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:42 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:42 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 485.076533][T16045] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:26:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:42 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) [ 485.413807][T16082] Dev loop5: unable to read RDB block 1 [ 485.427219][T16082] loop5: unable to read partition table [ 485.447151][T16082] loop5: partition table beyond EOD, truncated [ 485.455803][T16082] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 486.470939][T16089] IPVS: ftp: loaded support on port[0] = 21 [ 486.617940][T16089] chnl_net:caif_netlink_parms(): no params data found [ 486.638587][T16089] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.645861][T16089] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.653592][T16089] device bridge_slave_0 entered promiscuous mode [ 486.710028][T16089] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.717095][T16089] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.727548][T16089] device bridge_slave_1 entered promiscuous mode [ 486.743952][T16089] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 486.800043][T16089] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 486.814940][T16089] team0: Port device team_slave_0 added [ 486.822026][T16089] team0: Port device team_slave_1 added [ 486.891795][T16089] device hsr_slave_0 entered promiscuous mode [ 486.928955][T16089] device hsr_slave_1 entered promiscuous mode [ 487.024760][T16089] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.032016][T16089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 487.039438][T16089] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.046599][T16089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 487.127524][T16089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 487.138118][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 487.146393][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.155020][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.163585][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 487.175034][T16089] 8021q: adding VLAN 0 to HW filter on device team0 [ 487.182911][ T7817] device bridge_slave_1 left promiscuous mode [ 487.189305][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.239527][ T7817] device bridge_slave_0 left promiscuous mode [ 487.245785][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.582846][ T7817] device hsr_slave_1 left promiscuous mode [ 488.642875][ T7817] device hsr_slave_0 left promiscuous mode [ 488.704227][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 488.715031][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 488.725581][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 488.786073][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 488.847926][ T7817] bond0 (unregistering): Released all slaves [ 488.984237][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 488.992601][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.999671][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 489.007407][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 489.016653][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 489.023750][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 489.033586][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 489.042519][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 489.051305][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 489.060955][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 489.070842][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 489.084007][T16089] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 489.095477][T16089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 489.106881][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 489.115655][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 489.123979][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 489.132208][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 489.140593][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 489.155592][T16089] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:46 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:46 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:46 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:46 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) [ 489.285275][T16097] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒ' is invalid 11:26:46 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:46 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:46 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:46 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) 11:26:46 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:46 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:46 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:46 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:47 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) 11:26:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:47 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {}, [{0x2, 0x5}, {0x2, 0x1}, {}, {0x2, 0x5}, {}], {0x4, 0x3}, [{0x8, 0x1}, {0x8, 0x7}], {0x10, 0x4}, {0x20, 0x4}}, 0x5c, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 11:26:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 490.554872][T16183] overlayfs: lowerdir is in-use as upperdir/workdir 11:26:47 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:47 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 490.635184][T16191] overlayfs: workdir and upperdir must reside under the same mount 11:26:47 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 492.092885][T16215] IPVS: ftp: loaded support on port[0] = 21 [ 492.191143][T16215] chnl_net:caif_netlink_parms(): no params data found [ 492.214111][T16215] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.221726][T16215] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.229629][T16215] device bridge_slave_0 entered promiscuous mode [ 492.286070][T16215] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.293851][T16215] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.301607][T16215] device bridge_slave_1 entered promiscuous mode [ 492.317314][T16215] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 492.327235][T16215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 492.394434][T16215] team0: Port device team_slave_0 added [ 492.401671][T16215] team0: Port device team_slave_1 added [ 492.461020][T16215] device hsr_slave_0 entered promiscuous mode [ 492.528900][T16215] device hsr_slave_1 entered promiscuous mode [ 492.633193][T16215] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.640344][T16215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.647594][T16215] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.654661][T16215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.736502][T16215] 8021q: adding VLAN 0 to HW filter on device bond0 [ 492.747397][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 492.755541][ T7758] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.763394][ T7758] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.772121][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 492.783018][ T7817] device bridge_slave_1 left promiscuous mode [ 492.789392][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.849541][ T7817] device bridge_slave_0 left promiscuous mode [ 492.855739][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.230949][ T7817] device hsr_slave_1 left promiscuous mode [ 494.272919][ T7817] device hsr_slave_0 left promiscuous mode [ 494.361284][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 494.373200][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 494.384318][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 494.424130][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 494.504748][ T7817] bond0 (unregistering): Released all slaves [ 494.623912][T16215] 8021q: adding VLAN 0 to HW filter on device team0 [ 494.634591][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 494.643683][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 494.652156][ T3001] bridge0: port 1(bridge_slave_0) entered blocking state [ 494.659248][ T3001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 494.669445][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 494.678018][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 494.686894][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.693999][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 494.704268][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 494.720648][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 494.738546][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 494.747189][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 494.755795][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 494.764327][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 494.773257][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 494.782146][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 494.790391][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 494.798839][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 494.810945][T16215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 494.819843][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 494.878192][T16215] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 494.987751][T16223] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:26:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:52 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {}, [{0x2, 0x5}, {0x2, 0x1}, {}, {0x2, 0x5}, {}], {0x4, 0x3}, [{0x8, 0x1}, {0x8, 0x7}], {0x10, 0x4}, {0x20, 0x4}}, 0x5c, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 11:26:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 495.114995][T16226] overlayfs: lowerdir is in-use as upperdir/workdir 11:26:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:52 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:52 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:52 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:52 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:52 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:52 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:53 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:53 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:53 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:53 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:53 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 497.748872][T16328] IPVS: ftp: loaded support on port[0] = 21 [ 497.847556][T16328] chnl_net:caif_netlink_parms(): no params data found [ 497.922458][T16328] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.930026][T16328] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.937635][T16328] device bridge_slave_0 entered promiscuous mode [ 497.945331][T16328] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.952709][T16328] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.960310][T16328] device bridge_slave_1 entered promiscuous mode [ 498.025182][T16328] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 498.034915][T16328] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 498.050767][T16328] team0: Port device team_slave_0 added [ 498.057424][T16328] team0: Port device team_slave_1 added [ 498.064252][ T7817] device bridge_slave_1 left promiscuous mode [ 498.071007][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.129737][ T7817] device bridge_slave_0 left promiscuous mode [ 498.136085][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.501210][ T7817] device hsr_slave_1 left promiscuous mode [ 499.571554][ T7817] device hsr_slave_0 left promiscuous mode [ 499.623272][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 499.636673][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 499.647631][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 499.672588][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 499.765209][ T7817] bond0 (unregistering): Released all slaves [ 499.950447][T16328] device hsr_slave_0 entered promiscuous mode [ 500.008791][T16328] device hsr_slave_1 entered promiscuous mode [ 500.087369][T16328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 500.098302][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 500.106501][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 500.117262][T16328] 8021q: adding VLAN 0 to HW filter on device team0 [ 500.127600][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 500.136790][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 500.145554][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.152814][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 500.162118][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 500.172574][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 500.181499][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 500.190969][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.198009][ T7758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 500.210296][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 500.229841][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 500.238576][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 500.247084][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 500.255903][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 500.264571][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 500.273187][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 500.281536][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 500.290386][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 500.303633][T16328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 500.374684][T16328] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:57 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:57 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 500.487945][T16336] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:26:57 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:57 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:57 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:57 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:57 executing program 5: setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:58 executing program 5: setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:58 executing program 5: setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:58 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:58 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:26:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:58 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:26:58 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) mincore(&(0x7f00001b0000/0x1000)=nil, 0x1000, 0x0) 11:26:58 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:26:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:26:58 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 503.160390][T16441] IPVS: ftp: loaded support on port[0] = 21 [ 503.262265][T16441] chnl_net:caif_netlink_parms(): no params data found [ 503.333722][T16441] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.341323][T16441] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.349319][T16441] device bridge_slave_0 entered promiscuous mode [ 503.356867][T16441] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.364053][T16441] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.372011][T16441] device bridge_slave_1 entered promiscuous mode [ 503.437215][T16441] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 503.447872][T16441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 503.513563][T16441] team0: Port device team_slave_0 added [ 503.522466][T16441] team0: Port device team_slave_1 added [ 503.570168][T16441] device hsr_slave_0 entered promiscuous mode [ 503.608836][T16441] device hsr_slave_1 entered promiscuous mode [ 503.723054][T16441] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.730152][T16441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 503.737404][T16441] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.744476][T16441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 503.770471][ T7817] device bridge_slave_1 left promiscuous mode [ 503.776666][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.809351][ T7817] device bridge_slave_0 left promiscuous mode [ 503.815569][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.170805][ T7817] device hsr_slave_1 left promiscuous mode [ 505.231712][ T7817] device hsr_slave_0 left promiscuous mode [ 505.271711][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 505.284224][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 505.294965][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 505.343267][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 505.424871][ T7817] bond0 (unregistering): Released all slaves [ 505.526373][T16441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 505.534059][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.542181][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.550364][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 505.566657][T16441] 8021q: adding VLAN 0 to HW filter on device team0 [ 505.574033][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 505.582465][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 505.601849][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 505.611113][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 505.620110][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 505.627141][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 505.634924][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 505.643388][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 505.651755][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 505.658812][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 505.666268][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 505.674816][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 505.728493][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 505.737226][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 505.746160][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 505.755187][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 505.771374][T16441] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 505.785631][T16441] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 505.802987][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 505.813615][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 505.825768][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 505.836158][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 505.848118][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 505.867403][T16441] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 505.885593][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 505.992622][T16449] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:27:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {}, [{}, {}, {}, {}, {}], {}, [{}, {}]}, 0x5c, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) 11:27:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 506.123346][T16455] overlayfs: lowerdir is in-use as upperdir/workdir 11:27:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) getresgid(0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000009c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {0x1, 0x4}, [{0x2, 0x5}, {0x2, 0x1}, {0x2, 0x6}, {0x2, 0x6}, {0x2, 0x5}], {}, [{}, {0x8, 0x7}], {0x10, 0x4}, {0x20, 0x4}}, 0x5c, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 11:27:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 506.409712][T16476] overlayfs: lowerdir is in-use as upperdir/workdir [ 506.466239][T16485] overlayfs: workdir and upperdir must reside under the same mount 11:27:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:03 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:03 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000003c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) stat(&(0x7f00000009c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {0x1, 0x4}, [{}, {0x2, 0x1}, {0x2, 0x6}, {0x2, 0x6}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x3}, [{}, {0x8, 0x7}], {0x10, 0x4}}, 0x64, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 11:27:03 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) [ 506.784169][T16497] overlayfs: lowerdir is in-use as upperdir/workdir [ 506.823114][T16497] overlayfs: workdir and upperdir must reside under the same mount 11:27:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:04 executing program 5: 11:27:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:04 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000040)='./file0\x00') writev(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) 11:27:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:04 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:04 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:04 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:04 executing program 5: [ 508.684213][T16557] IPVS: ftp: loaded support on port[0] = 21 [ 508.830813][T16557] chnl_net:caif_netlink_parms(): no params data found [ 508.854078][T16557] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.861528][T16557] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.869473][T16557] device bridge_slave_0 entered promiscuous mode [ 508.923288][T16557] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.930618][T16557] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.938326][T16557] device bridge_slave_1 entered promiscuous mode [ 508.954098][T16557] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 508.964071][T16557] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 508.980737][ T7817] device bridge_slave_1 left promiscuous mode [ 508.987054][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.029652][ T7817] device bridge_slave_0 left promiscuous mode [ 509.035923][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.400185][ T7817] device hsr_slave_1 left promiscuous mode [ 510.462625][ T7817] device hsr_slave_0 left promiscuous mode [ 510.512855][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 510.523492][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 510.533840][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 510.573217][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 510.635558][ T7817] bond0 (unregistering): Released all slaves [ 510.742771][T16557] team0: Port device team_slave_0 added [ 510.750535][T16557] team0: Port device team_slave_1 added [ 510.801068][T16557] device hsr_slave_0 entered promiscuous mode [ 510.838840][T16557] device hsr_slave_1 entered promiscuous mode [ 510.927043][T16557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.937741][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 510.946045][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.955926][T16557] 8021q: adding VLAN 0 to HW filter on device team0 [ 510.966965][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 510.975658][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 510.984047][ T3001] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.991171][ T3001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.001052][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 511.012178][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 511.021139][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 511.030401][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.037431][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.057867][T16557] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 511.068501][T16557] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 511.081405][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 511.090853][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 511.099846][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 511.108411][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 511.116736][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 511.125374][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 511.133723][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 511.142094][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 511.150397][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 511.157924][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 511.217512][T16557] 8021q: adding VLAN 0 to HW filter on device batadv0 11:27:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:08 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x2000) 11:27:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 511.310736][T16565] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:27:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:08 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:08 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:08 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ddb000/0x3000)=nil, 0x3000, 0x0) 11:27:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:08 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffbd}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 11:27:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x18, 0x0, 0x0, 0x2, 0x1}, 0x28) 11:27:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:09 executing program 5: syz_open_dev$amidi(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000001040)=[0x0, 0x0, 0x0], 0x0) 11:27:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:09 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:09 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:09 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 514.061021][T16674] IPVS: ftp: loaded support on port[0] = 21 [ 514.209493][T16674] chnl_net:caif_netlink_parms(): no params data found [ 514.232953][T16674] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.240739][T16674] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.248398][T16674] device bridge_slave_0 entered promiscuous mode [ 514.302475][T16674] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.309784][T16674] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.317342][T16674] device bridge_slave_1 entered promiscuous mode [ 514.333674][T16674] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 514.344275][T16674] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 514.409333][T16674] team0: Port device team_slave_0 added [ 514.415959][T16674] team0: Port device team_slave_1 added [ 514.460136][T16674] device hsr_slave_0 entered promiscuous mode [ 514.508876][T16674] device hsr_slave_1 entered promiscuous mode [ 514.622817][T16674] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.629910][T16674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 514.637175][T16674] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.644369][T16674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 514.670407][ T7817] device bridge_slave_1 left promiscuous mode [ 514.676596][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.729270][ T7817] device bridge_slave_0 left promiscuous mode [ 514.735433][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.121052][ T7817] device hsr_slave_1 left promiscuous mode [ 516.171519][ T7817] device hsr_slave_0 left promiscuous mode [ 516.223494][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 516.234319][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 516.245436][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 516.284124][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 516.343425][ T7817] bond0 (unregistering): Released all slaves [ 516.426037][T16674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 516.433896][ T3001] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.441628][ T3001] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.450130][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 516.464763][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 516.472650][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 516.481898][T16674] 8021q: adding VLAN 0 to HW filter on device team0 [ 516.492393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 516.501203][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 516.509737][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.516773][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.530471][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 516.542217][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 516.551856][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.558957][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.566612][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 516.577833][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 516.636013][T16674] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 516.651153][T16674] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 516.664577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 516.678271][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 516.691909][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 516.703039][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 516.714736][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 516.724884][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 516.736508][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 516.746528][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 516.758497][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 516.766545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 516.784439][T16674] 8021q: adding VLAN 0 to HW filter on device batadv0 11:27:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 516.887424][T16682] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:27:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:14 executing program 5: syz_open_dev$amidi(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000001040)=[0x0, 0x0, 0x0], 0x0) 11:27:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:14 executing program 5: 11:27:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:14 executing program 5: 11:27:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:14 executing program 5: 11:27:14 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:14 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:15 executing program 5: 11:27:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:15 executing program 5: 11:27:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:15 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:15 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:15 executing program 5: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 11:27:15 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) [ 519.518220][T16782] IPVS: ftp: loaded support on port[0] = 21 [ 519.616465][T16782] chnl_net:caif_netlink_parms(): no params data found [ 519.690157][T16782] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.697227][T16782] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.705330][T16782] device bridge_slave_0 entered promiscuous mode [ 519.713391][T16782] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.721115][T16782] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.728996][T16782] device bridge_slave_1 entered promiscuous mode [ 519.790838][T16782] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 519.800540][T16782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 519.815395][T16782] team0: Port device team_slave_0 added [ 519.822595][T16782] team0: Port device team_slave_1 added [ 519.829010][ T7817] device bridge_slave_1 left promiscuous mode [ 519.835165][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.879582][ T7817] device bridge_slave_0 left promiscuous mode [ 519.885795][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.241310][ T7817] device hsr_slave_1 left promiscuous mode [ 521.311476][ T7817] device hsr_slave_0 left promiscuous mode [ 521.363972][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 521.375018][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 521.385850][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 521.432009][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 521.504214][ T7817] bond0 (unregistering): Released all slaves [ 521.651203][T16782] device hsr_slave_0 entered promiscuous mode [ 521.689148][T16782] device hsr_slave_1 entered promiscuous mode [ 521.764333][T16782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 521.775447][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 521.784800][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 521.796419][T16782] 8021q: adding VLAN 0 to HW filter on device team0 [ 521.806362][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 521.815335][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 521.824259][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.831368][ T7758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.840040][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 521.851705][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 521.860713][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 521.869758][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.876788][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.891954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 521.900722][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 521.909457][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 521.917866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 521.926890][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 521.935746][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 521.944656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 522.019834][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 522.028146][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 522.044199][T16782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 522.070061][T16782] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 522.182039][T16790] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:27:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:19 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:19 executing program 5: 11:27:19 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:19 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:19 executing program 5: 11:27:19 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:19 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:19 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:19 executing program 5: 11:27:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:20 executing program 5: 11:27:20 executing program 5: 11:27:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:20 executing program 5: 11:27:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180800006700e90000000000000000006311103a000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 11:27:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:20 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:20 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x2, 0x0, 0x705) 11:27:20 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:20 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 524.842366][T16888] IPVS: ftp: loaded support on port[0] = 21 [ 524.942486][T16888] chnl_net:caif_netlink_parms(): no params data found [ 525.011356][T16888] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.018816][T16888] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.026563][T16888] device bridge_slave_0 entered promiscuous mode [ 525.034252][T16888] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.041822][T16888] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.049603][T16888] device bridge_slave_1 entered promiscuous mode [ 525.112598][T16888] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 525.122988][T16888] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 525.138793][T16888] team0: Port device team_slave_0 added [ 525.145069][ T7817] device bridge_slave_1 left promiscuous mode [ 525.151810][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.199375][ T7817] device bridge_slave_0 left promiscuous mode [ 525.205565][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.531242][ T7817] device hsr_slave_1 left promiscuous mode [ 526.601369][ T7817] device hsr_slave_0 left promiscuous mode [ 526.652893][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 526.663612][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 526.674893][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 526.714194][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 526.794757][ T7817] bond0 (unregistering): Released all slaves [ 526.893014][T16888] team0: Port device team_slave_1 added [ 526.970955][T16888] device hsr_slave_0 entered promiscuous mode [ 527.019051][T16888] device hsr_slave_1 entered promiscuous mode [ 527.104555][T16888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 527.117093][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 527.125988][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 527.136709][T16888] 8021q: adding VLAN 0 to HW filter on device team0 [ 527.146679][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 527.155640][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 527.164350][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.171452][ T7758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 527.180937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 527.193272][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 527.202254][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 527.210697][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.217723][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.274061][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 527.296190][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 527.305032][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 527.320029][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 527.332813][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 527.342755][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 527.362744][T16888] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 527.377223][T16888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 527.394710][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 527.403537][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 527.417178][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 527.435657][T16888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 527.448180][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:27:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:24 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:24 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:24 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000072000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000527ff8)=0xfffffffffffffffc, 0x9, 0x0) [ 527.559301][T16896] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:27:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:24 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:24 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:24 executing program 5: mbind(&(0x7f0000072000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x4000) 11:27:24 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x18, 0x4, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 11:27:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 528.370944][T16937] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid 11:27:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="9f85b8a147c1cc24eb9620046a9830e3029b42da6cad3506b1a302afc752a5e98bdf63f2cd876c0ede83b5", 0x2b, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', &(0x7f0000000440)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0x3, 0x0, 0x4, 0x3, 0xff, 0xffffffffffffff0f}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000, r1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:25 executing program 5: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:25 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:25 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:25 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:27:26 executing program 0: pipe(&(0x7f0000000300)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000002840)={[0x2002, 0x3001, 0x1000, 0x10d000], 0x2, 0x40}) 11:27:26 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x100000000000001, 0x84) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x1ff, 0x5, 0x1, 0x100, 0x4, 0xfffffffffffffff7, 0x400, 0x8000}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local, @local={0xac, 0x224}}}}}, 0x0) 11:27:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 11:27:26 executing program 1: unshare(0x40400) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 530.263522][T16988] IPVS: ftp: loaded support on port[0] = 21 [ 530.405252][T16988] chnl_net:caif_netlink_parms(): no params data found [ 530.526108][T16988] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.533341][T16988] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.540981][T16988] device bridge_slave_0 entered promiscuous mode [ 530.548433][T16988] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.555542][T16988] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.563195][T16988] device bridge_slave_1 entered promiscuous mode [ 530.672010][T16988] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 530.681908][T16988] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 530.696196][T16988] team0: Port device team_slave_0 added [ 530.703500][T16988] team0: Port device team_slave_1 added [ 530.850205][T16988] device hsr_slave_0 entered promiscuous mode [ 530.888750][T16988] device hsr_slave_1 entered promiscuous mode [ 531.065414][T16988] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.072516][T16988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.079880][T16988] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.086903][T16988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.110150][ T7817] device bridge_slave_1 left promiscuous mode [ 531.116372][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.169358][ T7817] device bridge_slave_0 left promiscuous mode [ 531.175523][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.249683][ T7817] device bridge_slave_1 left promiscuous mode [ 531.255858][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.329911][ T7817] device bridge_slave_0 left promiscuous mode [ 531.336088][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 533.970389][ T7817] device hsr_slave_1 left promiscuous mode [ 534.022981][ T7817] device hsr_slave_0 left promiscuous mode [ 534.082652][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 534.093597][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 534.105014][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 534.163546][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 534.245056][ T7817] bond0 (unregistering): Released all slaves [ 534.461299][ T7817] device hsr_slave_1 left promiscuous mode [ 534.503511][ T7817] device hsr_slave_0 left promiscuous mode [ 534.563951][ T7817] team0 (unregistering): Port device team_slave_1 removed [ 534.574562][ T7817] team0 (unregistering): Port device team_slave_0 removed [ 534.584561][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 534.632115][ T7817] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 534.695767][ T7817] bond0 (unregistering): Released all slaves [ 534.796768][T16988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 534.804553][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 534.812779][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 534.820904][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 534.836787][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 534.844495][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 534.855071][T16988] 8021q: adding VLAN 0 to HW filter on device team0 [ 534.863932][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 534.872936][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 534.881920][ T3001] bridge0: port 1(bridge_slave_0) entered blocking state [ 534.889122][ T3001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 534.909036][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 534.917678][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 534.926419][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 534.933534][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 534.941798][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 534.950526][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 534.959176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 534.967682][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 534.976095][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 534.984609][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 534.994079][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 535.002039][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 535.010535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 535.022267][T16988] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 535.035659][T16988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 535.043587][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 535.052659][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 535.067633][T16988] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 535.135635][T16996] encrypted_key: master key parameter 'j˜0ã›BÚl­5±£¯ÇR¥é‹ßcò͇lÞƒµ' is invalid [ 535.159750][ T7817] ------------[ cut here ]------------ [ 535.165287][ T7817] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 535.176201][ T7817] WARNING: CPU: 1 PID: 7817 at lib/debugobjects.c:484 debug_check_no_obj_freed+0x464/0x5b0 [ 535.186246][ T7817] Kernel panic - not syncing: panic_on_warn set ... [ 535.192962][ T7817] CPU: 1 PID: 7817 Comm: kworker/u4:5 Not tainted 5.2.0+ #20 [ 535.200312][ T7817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.210523][ T7817] Workqueue: netns cleanup_net [ 535.215302][ T7817] Call Trace: [ 535.218582][ T7817] dump_stack+0x1d8/0x2f8 [ 535.222894][ T7817] panic+0x28a/0x7c9 [ 535.226776][ T7817] ? trace_lock_acquire+0x11c/0x190 [ 535.231959][ T7817] ? __warn+0x126/0x220 [ 535.236092][ T7817] ? nmi_panic+0x97/0x97 [ 535.240317][ T7817] ? debug_check_no_obj_freed+0x464/0x5b0 [ 535.246018][ T7817] ? is_valid_bugaddr+0x81/0x100 [ 535.250936][ T7817] __warn+0x216/0x220 [ 535.254902][ T7817] ? debug_check_no_obj_freed+0x464/0x5b0 [ 535.260600][ T7817] report_bug+0x190/0x290 [ 535.264933][ T7817] ? debug_check_no_obj_freed+0x464/0x5b0 [ 535.270662][ T7817] do_error_trap+0xd7/0x440 [ 535.275150][ T7817] do_invalid_op+0x36/0x40 [ 535.279561][ T7817] ? debug_check_no_obj_freed+0x464/0x5b0 [ 535.285291][ T7817] invalid_op+0x14/0x20 [ 535.289527][ T7817] RIP: 0010:debug_check_no_obj_freed+0x464/0x5b0 [ 535.295833][ T7817] Code: 08 48 89 df e8 dd ff 4e fe 4c 8b 03 48 c7 c7 0c a5 66 88 48 c7 c6 0c d0 7e 88 4c 89 e2 44 89 f9 4d 89 e9 31 c0 e8 dc 58 e7 fd <0f> 0b 4c 8b 6d a8 ff 05 44 f4 7c 05 49 83 c5 30 4c 89 e8 48 c1 e8 [ 535.315456][ T7817] RSP: 0018:ffff88806502f708 EFLAGS: 00010046 [ 535.321556][ T7817] RAX: 0ff8fcc6bfcbe500 RBX: ffffffff88ad7c00 RCX: ffff888088a5a100 [ 535.329563][ T7817] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 535.337520][ T7817] RBP: ffff88806502f7a0 R08: ffffffff815efa54 R09: ffffed1015d640c2 [ 535.345479][ T7817] R10: ffffed1015d640c2 R11: 1ffff11015d640c1 R12: ffffffff8871f84f [ 535.353559][ T7817] R13: ffffffff814e21b0 R14: dffffc0000000000 R15: 0000000000000000 [ 535.361619][ T7817] ? queue_work_node+0x310/0x310 [ 535.366577][ T7817] ? vprintk_emit+0x2d4/0x3a0 [ 535.371246][ T7817] ? debug_check_no_obj_freed+0x464/0x5b0 [ 535.376977][ T7817] ? kvfree+0x47/0x50 [ 535.381027][ T7817] kfree+0xa0/0x120 [ 535.384939][ T7817] kvfree+0x47/0x50 [ 535.388910][ T7817] netdev_freemem+0x3e/0x60 [ 535.393397][ T7817] netdev_release+0x7e/0xb0 [ 535.397884][ T7817] ? netdev_uevent+0xa0/0xa0 [ 535.402484][ T7817] device_release+0x74/0x1a0 [ 535.407052][ T7817] kobject_cleanup+0x2f7/0x4c0 [ 535.411843][ T7817] kobject_put+0xad/0xe0 [ 535.416189][ T7817] netdev_run_todo+0xc6f/0xe00 [ 535.420941][ T7817] ? netdev_refcnt_read+0x1c0/0x1c0 [ 535.426122][ T7817] ? unregister_netdevice_queue+0x277/0x500 [ 535.432015][ T7817] ? alloc_netdev_mqs+0xe50/0xe50 [ 535.437021][ T7817] ? br_dev_delete+0x10d/0x120 [ 535.441791][ T7817] rtnl_unlock+0xe/0x10 [ 535.445932][ T7817] default_device_exit_batch+0x71c/0x790 [ 535.451548][ T7817] ? default_device_exit+0x260/0x260 [ 535.456930][ T7817] ? wait_woken+0x2c0/0x2c0 [ 535.461465][ T7817] ? rtnl_unlock+0xe/0x10 [ 535.465774][ T7817] ? cfg802154_pernet_exit+0xce/0xe0 [ 535.471035][ T7817] ? default_device_exit+0x260/0x260 [ 535.476426][ T7817] cleanup_net+0x64f/0xa10 [ 535.480831][ T7817] ? ops_free_list+0x360/0x360 [ 535.485577][ T7817] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 535.491281][ T7817] process_one_work+0x82b/0x1140 [ 535.496287][ T7817] ? rescuer_thread+0x1670/0x1670 [ 535.501314][ T7817] ? worker_thread+0x10de/0x1640 [ 535.506231][ T7817] worker_thread+0xc01/0x1640 [ 535.510911][ T7817] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 535.516789][ T7817] kthread+0x325/0x350 [ 535.520836][ T7817] ? rcu_lock_release+0x30/0x30 [ 535.525662][ T7817] ? kthread_blkcg+0xe0/0xe0 [ 535.530317][ T7817] ret_from_fork+0x24/0x30 [ 535.536426][ T7817] Kernel Offset: disabled [ 535.540838][ T7817] Rebooting in 86400 seconds..