00000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 177.965047][ T26] EXT4-fs (loop1): i_reserved_data_blocks=17 21:29:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(0xffffffffffffffff, r2, 0x0, 0x80040) 21:29:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x401054d5, 0x0) [ 178.066426][ T5208] loop5: detected capacity change from 0 to 2048 [ 178.104925][ T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set [ 178.121688][ T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 178.134154][ T52] EXT4-fs (loop5): This should not happen!! Data will be lost [ 178.134154][ T52] [ 178.143835][ T52] EXT4-fs (loop5): Total free blocks count 0 [ 178.149825][ T52] EXT4-fs (loop5): Free/Dirty block details [ 178.155753][ T52] EXT4-fs (loop5): free_blocks=0 [ 178.160683][ T52] EXT4-fs (loop5): dirty_blocks=16 [ 178.165810][ T52] EXT4-fs (loop5): Block reservation details [ 178.171791][ T52] EXT4-fs (loop5): i_reserved_data_blocks=1 [ 178.179220][ T52] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set [ 178.194160][ T52] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 257 with error 28 [ 178.206613][ T52] EXT4-fs (loop0): This should not happen!! Data will be lost [ 178.206613][ T52] [ 178.216347][ T52] EXT4-fs (loop0): Total free blocks count 0 [ 178.222387][ T52] EXT4-fs (loop0): Free/Dirty block details [ 178.228449][ T52] EXT4-fs (loop0): free_blocks=0 [ 178.233379][ T52] EXT4-fs (loop0): dirty_blocks=272 [ 178.238667][ T52] EXT4-fs (loop0): Block reservation details [ 178.244647][ T52] EXT4-fs (loop0): i_reserved_data_blocks=17 21:29:12 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r2) 21:29:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x401054d6, 0x0) 21:29:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(0xffffffffffffffff, r2, 0x0, 0x80040) 21:29:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x401c5820, 0x0) 21:29:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(0xffffffffffffffff, r2, 0x0, 0x80040) [ 178.406714][ T5223] loop5: detected capacity change from 0 to 2048 21:29:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r2) 21:29:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 178.449054][ T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set [ 178.485322][ T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117 21:29:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) dup2(r0, r2) [ 178.497690][ T52] EXT4-fs (loop5): This should not happen!! Data will be lost [ 178.497690][ T52] [ 178.543872][ T5238] loop5: detected capacity change from 0 to 2048 [ 178.574285][ T26] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set [ 178.589096][ T26] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117 [ 178.601441][ T26] EXT4-fs (loop5): This should not happen!! Data will be lost [ 178.601441][ T26] 21:29:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x4020940d, 0x0) 21:29:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) dup2(r0, r2) 21:29:13 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040) 21:29:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040) [ 179.259887][ T5251] loop5: detected capacity change from 0 to 2048 [ 179.282695][ T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set 21:29:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454cf, 0x0) 21:29:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) dup2(r0, r2) [ 179.298228][ T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 179.310457][ T52] EXT4-fs (loop5): This should not happen!! Data will be lost [ 179.310457][ T52] [ 179.320113][ T52] EXT4-fs (loop5): Total free blocks count 0 [ 179.326173][ T52] EXT4-fs (loop5): Free/Dirty block details [ 179.332211][ T52] EXT4-fs (loop5): free_blocks=0 [ 179.337255][ T52] EXT4-fs (loop5): dirty_blocks=16 [ 179.342361][ T52] EXT4-fs (loop5): Block reservation details [ 179.348398][ T52] EXT4-fs (loop5): i_reserved_data_blocks=1 21:29:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) dup2(r0, r2) 21:29:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, 0xffffffffffffffff) 21:29:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040) [ 179.394978][ T5266] loop5: detected capacity change from 0 to 2048 [ 179.436808][ T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set [ 179.461287][ T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117 [ 179.473630][ T52] EXT4-fs (loop5): This should not happen!! Data will be lost [ 179.473630][ T52] [ 179.501575][ T5278] loop5: detected capacity change from 0 to 2048 [ 179.522708][ T3227] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:6: bg 0: block 234: padding at end of block bitmap is not set [ 179.537452][ T3227] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 179.554535][ T3227] EXT4-fs (loop5): This should not happen!! Data will be lost [ 179.554535][ T3227] [ 179.564201][ T3227] EXT4-fs (loop5): Total free blocks count 0 [ 179.570297][ T3227] EXT4-fs (loop5): Free/Dirty block details [ 179.576214][ T3227] EXT4-fs (loop5): free_blocks=0 [ 179.581149][ T3227] EXT4-fs (loop5): dirty_blocks=16 [ 179.586325][ T3227] EXT4-fs (loop5): Block reservation details [ 179.592384][ T3227] EXT4-fs (loop5): i_reserved_data_blocks=1 21:29:14 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:14 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, 0xffffffffffffffff) 21:29:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454d2, 0x0) 21:29:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) dup2(r0, r1) 21:29:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x0) 21:29:14 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, 0xffffffffffffffff) 21:29:14 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454d3, 0x0) 21:29:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) dup2(r0, r1) 21:29:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, 0xffffffffffffffff) 21:29:14 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 180.125428][ T5289] loop5: detected capacity change from 0 to 2048 [ 180.147245][ T5289] EXT4-fs mount: 378 callbacks suppressed [ 180.147257][ T5289] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 180.213774][ T3227] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:6: bg 0: block 234: padding at end of block bitmap is not set [ 180.229341][ T3227] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117 [ 180.241677][ T3227] EXT4-fs (loop5): This should not happen!! Data will be lost [ 180.241677][ T3227] [ 180.252199][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:15 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x0) 21:29:15 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454d7, 0x0) 21:29:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x0) 21:29:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) dup2(r0, r1) 21:29:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) [ 180.989826][ T5315] loop0: detected capacity change from 0 to 2048 [ 180.993132][ T5319] loop5: detected capacity change from 0 to 2048 [ 181.007466][ T5315] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 181.007466][ T5319] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 21:29:15 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:15 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454dd, 0x0) 21:29:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x0) [ 181.053599][ T52] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set [ 181.072481][ T52] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 181.084782][ T52] EXT4-fs (loop0): This should not happen!! Data will be lost [ 181.084782][ T52] [ 181.094438][ T52] EXT4-fs (loop0): Total free blocks count 0 21:29:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 181.100574][ T52] EXT4-fs (loop0): Free/Dirty block details [ 181.106480][ T52] EXT4-fs (loop0): free_blocks=0 [ 181.111422][ T52] EXT4-fs (loop0): dirty_blocks=16 [ 181.116544][ T52] EXT4-fs (loop0): Block reservation details [ 181.122545][ T52] EXT4-fs (loop0): i_reserved_data_blocks=1 [ 181.132994][ T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set 21:29:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) [ 181.152653][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 181.162990][ T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 181.175275][ T52] EXT4-fs (loop5): This should not happen!! Data will be lost [ 181.175275][ T52] [ 181.184958][ T52] EXT4-fs (loop5): Total free blocks count 0 [ 181.190998][ T52] EXT4-fs (loop5): Free/Dirty block details [ 181.196946][ T52] EXT4-fs (loop5): free_blocks=0 [ 181.201881][ T52] EXT4-fs (loop5): dirty_blocks=16 [ 181.207018][ T52] EXT4-fs (loop5): Block reservation details [ 181.213012][ T52] EXT4-fs (loop5): i_reserved_data_blocks=1 [ 181.220073][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 181.259724][ T5338] loop5: detected capacity change from 0 to 2048 [ 181.286764][ T5338] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 181.307328][ T455] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:5: bg 0: block 234: padding at end of block bitmap is not set [ 181.322072][ T455] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 181.334348][ T455] EXT4-fs (loop5): This should not happen!! Data will be lost [ 181.334348][ T455] [ 181.344036][ T455] EXT4-fs (loop5): Total free blocks count 0 [ 181.350473][ T455] EXT4-fs (loop5): Free/Dirty block details [ 181.356383][ T455] EXT4-fs (loop5): free_blocks=0 [ 181.361324][ T455] EXT4-fs (loop5): dirty_blocks=16 [ 181.366497][ T455] EXT4-fs (loop5): Block reservation details [ 181.372484][ T455] EXT4-fs (loop5): i_reserved_data_blocks=1 [ 181.380126][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) 21:29:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x0) 21:29:16 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0) 21:29:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 181.841611][ T5344] loop5: detected capacity change from 0 to 2048 [ 181.866868][ T5344] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 181.894491][ T455] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:5: bg 0: block 234: padding at end of block bitmap is not set [ 181.911391][ T455] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 181.923630][ T455] EXT4-fs (loop5): This should not happen!! Data will be lost [ 181.923630][ T455] [ 181.933397][ T455] EXT4-fs (loop5): Total free blocks count 0 [ 181.939422][ T455] EXT4-fs (loop5): Free/Dirty block details [ 181.945343][ T455] EXT4-fs (loop5): free_blocks=0 [ 181.950326][ T455] EXT4-fs (loop5): dirty_blocks=16 [ 181.955460][ T455] EXT4-fs (loop5): Block reservation details [ 181.961498][ T455] EXT4-fs (loop5): i_reserved_data_blocks=1 [ 181.968835][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454e0, 0x0) 21:29:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) 21:29:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454e1, 0x0) 21:29:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, 0xffffffffffffffff) 21:29:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, 0xffffffffffffffff) 21:29:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x80086601, 0x0) 21:29:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, 0xffffffffffffffff) [ 182.688874][ T27] kauditd_printk_skb: 1514 callbacks suppressed [ 182.688884][ T27] audit: type=1326 audit(1702502957.012:3108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.719851][ T27] audit: type=1326 audit(1702502957.012:3109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.743890][ T27] audit: type=1326 audit(1702502957.012:3110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.767732][ T27] audit: type=1326 audit(1702502957.012:3111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.791731][ T27] audit: type=1326 audit(1702502957.012:3112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.815683][ T27] audit: type=1326 audit(1702502957.012:3113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040) 21:29:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:17 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0) 21:29:17 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) [ 182.839664][ T27] audit: type=1326 audit(1702502957.012:3114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.863696][ T27] audit: type=1326 audit(1702502957.012:3115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.871539][ T5388] loop5: detected capacity change from 0 to 2048 [ 182.887641][ T27] audit: type=1326 audit(1702502957.012:3116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x80087601, 0x0) 21:29:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:17 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(0xffffffffffffffff, r0) [ 182.918064][ T27] audit: type=1326 audit(1702502957.012:3117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 182.951835][ T5388] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 21:29:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) [ 183.004704][ T26] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set [ 183.025128][ T26] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 183.037495][ T26] EXT4-fs (loop5): This should not happen!! Data will be lost [ 183.037495][ T26] [ 183.047275][ T26] EXT4-fs (loop5): Total free blocks count 0 21:29:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x801054db, 0x0) 21:29:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:17 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(0xffffffffffffffff, r0) [ 183.053378][ T26] EXT4-fs (loop5): Free/Dirty block details [ 183.059352][ T26] EXT4-fs (loop5): free_blocks=0 [ 183.064286][ T26] EXT4-fs (loop5): dirty_blocks=16 [ 183.069460][ T26] EXT4-fs (loop5): Block reservation details [ 183.075461][ T26] EXT4-fs (loop5): i_reserved_data_blocks=1 [ 183.086296][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:18 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(0xffffffffffffffff, r0) 21:29:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x801c581f, 0x0) 21:29:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(0xffffffffffffffff, r0) 21:29:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0) 21:29:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:18 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0) 21:29:18 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0) 21:29:18 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0xc0045878, 0x0) 21:29:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:18 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0) 21:29:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0) 21:29:18 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0xc0045878, 0x0) 21:29:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0xc0189436, 0x0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 2: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0xc020660b, 0x0) 21:29:19 executing program 2: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0) 21:29:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 2: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0) 21:29:19 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(0xffffffffffffffff, r0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x800454df, 0x0) 21:29:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(0xffffffffffffffff, r0) 21:29:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0) 21:29:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3) 21:29:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(0xffffffffffffffff, r0) 21:29:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0) 21:29:20 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x4) 21:29:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) socket(0x10, 0x3, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r3) 21:29:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0) 21:29:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6) 21:29:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) socket(0x10, 0x3, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r3) 21:29:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0) 21:29:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) socket(0x10, 0x3, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r3) 21:29:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:21 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) 21:29:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:21 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) socket(0x10, 0x3, 0x0) dup2(r0, r3) 21:29:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xb) 21:29:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:21 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r3) 21:29:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x24) 21:29:22 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) dup2(r0, r3) 21:29:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x60) [ 188.115696][ T27] kauditd_printk_skb: 1440 callbacks suppressed [ 188.115707][ T27] audit: type=1326 audit(1702502962.432:4559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 188.146069][ T27] audit: type=1326 audit(1702502962.432:4560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 188.170079][ T27] audit: type=1326 audit(1702502962.432:4558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 188.194103][ T27] audit: type=1326 audit(1702502962.432:4561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 188.218019][ T27] audit: type=1326 audit(1702502962.432:4562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 188.241897][ T27] audit: type=1326 audit(1702502962.432:4563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 188.265837][ T27] audit: type=1326 audit(1702502962.432:4564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 188.289871][ T27] audit: type=1326 audit(1702502962.432:4565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) dup2(r0, r3) 21:29:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 188.313934][ T27] audit: type=1326 audit(1702502962.432:4566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 188.337790][ T27] audit: type=1326 audit(1702502962.432:4567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 21:29:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x103) 21:29:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) 21:29:23 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:23 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) dup2(r0, r3) 21:29:23 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) 21:29:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:23 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r2) 21:29:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1ee) 21:29:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) 21:29:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r2) 21:29:24 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:24 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x301) 21:29:24 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) 21:29:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:24 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r2) 21:29:24 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x305) 21:29:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:24 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:25 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x306) 21:29:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r2) 21:29:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r2) 21:29:25 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:25 executing program 3: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) 21:29:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:25 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:25 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30c) 21:29:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:25 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x801, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:25 executing program 3: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) 21:29:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:26 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:26 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, 0xffffffffffffffff) 21:29:26 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) 21:29:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, 0xffffffffffffffff) 21:29:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, 0xffffffffffffffff) 21:29:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:26 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:26 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x335) 21:29:26 executing program 3: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:27 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x336) 21:29:27 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) [ 193.259266][ T27] kauditd_printk_skb: 1309 callbacks suppressed [ 193.259277][ T27] audit: type=1326 audit(1702502967.582:5877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 21:29:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) [ 193.289974][ T27] audit: type=1326 audit(1702502967.582:5878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 193.313892][ T27] audit: type=1326 audit(1702502967.582:5879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 193.337747][ T27] audit: type=1326 audit(1702502967.582:5880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 193.361974][ T27] audit: type=1326 audit(1702502967.582:5881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 193.385902][ T27] audit: type=1326 audit(1702502967.582:5882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 21:29:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) [ 193.409902][ T27] audit: type=1326 audit(1702502967.582:5883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 193.433816][ T27] audit: type=1326 audit(1702502967.582:5884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 21:29:27 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:27 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) [ 193.457949][ T27] audit: type=1326 audit(1702502967.582:5885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 [ 193.481977][ T27] audit: type=1326 audit(1702502967.582:5886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000 21:29:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x337) 21:29:27 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(0xffffffffffffffff, r0) 21:29:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(0xffffffffffffffff, r0) 21:29:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:28 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:28 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:28 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:28 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) 21:29:28 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) 21:29:28 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(0xffffffffffffffff, r0) 21:29:28 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) 21:29:28 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) 21:29:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:28 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x503) 21:29:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:28 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(0x0, 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:29 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:29 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x600) 21:29:29 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(0x0, 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:29 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(0x0, 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:30 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x603) 21:29:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:30 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:30 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x700) 21:29:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:30 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) 21:29:30 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) 21:29:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x803) 21:29:31 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:31 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xa03) 21:29:31 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(0x0, 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) 21:29:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xb00) 21:29:31 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(0x0, 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:29:31 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:32 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:32 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(0x0, 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:29:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xc03) 21:29:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xe01) 21:29:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:29:32 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:32 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:32 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) [ 198.373018][ T27] kauditd_printk_skb: 374 callbacks suppressed [ 198.373030][ T27] audit: type=1326 audit(1702502972.692:6261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 198.403398][ T27] audit: type=1326 audit(1702502972.712:6262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 198.427316][ T27] audit: type=1326 audit(1702502972.712:6263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 198.451403][ T27] audit: type=1326 audit(1702502972.712:6264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 198.475334][ T27] audit: type=1326 audit(1702502972.712:6265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 198.499338][ T27] audit: type=1326 audit(1702502972.712:6266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f63dbe927a0 code=0x7ffc0000 [ 198.523387][ T27] audit: type=1326 audit(1702502972.752:6267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 198.547322][ T27] audit: type=1326 audit(1702502972.752:6268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 21:29:32 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:32 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:32 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1801) 21:29:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xb00) [ 198.571383][ T27] audit: type=1326 audit(1702502972.752:6269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 198.595329][ T27] audit: type=1326 audit(1702502972.752:6270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 21:29:33 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:33 executing program 5: r0 = creat(0x0, 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:33 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:33 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000) 21:29:33 executing program 5: r0 = creat(0x0, 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:33 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:33 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:33 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:33 executing program 0: r0 = creat(0x0, 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2400) 21:29:33 executing program 5: r0 = creat(0x0, 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:33 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:33 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2403) 21:29:33 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:33 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:34 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:34 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:34 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:34 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2503) 21:29:34 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:34 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3503) 21:29:34 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:34 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:34 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:34 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:35 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:35 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3603) 21:29:35 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:35 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) dup2(r0, r1) 21:29:35 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:35 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:35 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:35 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) dup2(0xffffffffffffffff, r0) 21:29:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x700) 21:29:35 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3703) 21:29:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3903) 21:29:36 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) dup2(0xffffffffffffffff, r0) 21:29:36 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:36 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:36 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:36 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:36 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) dup2(0xffffffffffffffff, r0) 21:29:36 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6000) 21:29:36 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) dup2(r0, 0xffffffffffffffff) 21:29:36 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xee01) 21:29:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20000) 21:29:36 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) dup2(r0, 0xffffffffffffffff) 21:29:36 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:37 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:37 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:37 executing program 1: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) dup2(r0, 0xffffffffffffffff) 21:29:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30000) 21:29:37 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:37 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(0xffffffffffffffff, r0) 21:29:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xb0000) 21:29:37 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, 0x0}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) 21:29:37 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) 21:29:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1000000) 21:29:38 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:38 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, 0x0}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1030000) 21:29:38 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) dup2(r0, r1) 21:29:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) socket(0x10, 0x3, 0x0) dup2(r0, r3) 21:29:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 203.763763][ T27] kauditd_printk_skb: 102 callbacks suppressed [ 203.763772][ T27] audit: type=1326 audit(1702502978.082:6373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fc1c3b5dba9 code=0x0 21:29:38 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, 0x0}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) [ 203.802196][ T27] audit: type=1326 audit(1702502978.122:6374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 203.826229][ T27] audit: type=1326 audit(1702502978.122:6375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:38 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) 21:29:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) dup2(r0, r1) [ 203.854811][ T27] audit: type=1326 audit(1702502978.122:6376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 203.878800][ T27] audit: type=1326 audit(1702502978.122:6377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 203.902795][ T27] audit: type=1326 audit(1702502978.122:6378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 203.926858][ T27] audit: type=1326 audit(1702502978.122:6379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:38 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) dup2(r0, r1) 21:29:38 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) [ 203.950854][ T27] audit: type=1326 audit(1702502978.122:6380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 203.974832][ T27] audit: type=1326 audit(1702502978.122:6381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454d0, 0x0) [ 203.998908][ T27] audit: type=1326 audit(1702502978.122:6382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:38 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1ee0000) 21:29:38 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(r0, r1) 21:29:38 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) 21:29:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r3) 21:29:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:39 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) 21:29:39 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(r0, r1) 21:29:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000000) 21:29:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(0xffffffffffffffff, r2, 0x0, 0x80040) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) 21:29:39 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) 21:29:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x4000000) [ 204.724228][ T6171] loop1: detected capacity change from 0 to 2048 [ 204.739686][ T6171] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 204.766385][ T26] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set [ 204.781530][ T26] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 204.793752][ T26] EXT4-fs (loop1): This should not happen!! Data will be lost [ 204.793752][ T26] [ 204.803410][ T26] EXT4-fs (loop1): Total free blocks count 0 [ 204.809425][ T26] EXT4-fs (loop1): Free/Dirty block details [ 204.815307][ T26] EXT4-fs (loop1): free_blocks=0 [ 204.820297][ T26] EXT4-fs (loop1): dirty_blocks=16 [ 204.825491][ T26] EXT4-fs (loop1): Block reservation details [ 204.831509][ T26] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 204.838376][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:39 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) 21:29:39 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(r0, r1) 21:29:39 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) 21:29:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x5030000) 21:29:39 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:39 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 21:29:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6000000) 21:29:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(0xffffffffffffffff, r2, 0x0, 0x80040) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) [ 205.502369][ T6187] loop1: detected capacity change from 0 to 2048 [ 205.517070][ T6187] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 205.531826][ T6187] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz-executor.1: bg 0: block 234: padding at end of block bitmap is not set 21:29:39 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 21:29:39 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) [ 205.561299][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6030000) [ 205.609780][ T6204] loop1: detected capacity change from 0 to 2048 [ 205.628298][ T6204] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 205.663249][ T26] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set [ 205.678166][ T26] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 205.690456][ T26] EXT4-fs (loop1): This should not happen!! Data will be lost [ 205.690456][ T26] [ 205.700492][ T26] EXT4-fs (loop1): Total free blocks count 0 [ 205.706723][ T26] EXT4-fs (loop1): Free/Dirty block details [ 205.712605][ T26] EXT4-fs (loop1): free_blocks=0 [ 205.717551][ T26] EXT4-fs (loop1): dirty_blocks=16 [ 205.722648][ T26] EXT4-fs (loop1): Block reservation details [ 205.728637][ T26] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 205.735670][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r3) socket$inet_udp(0x2, 0x2, 0x0) 21:29:40 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7000000) 21:29:40 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 21:29:40 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(r0, r1) 21:29:40 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:40 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 21:29:40 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 21:29:40 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) truncate(0x0, 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x8030000) 21:29:40 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) socket$inet(0x2b, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:40 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 21:29:40 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 21:29:41 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 21:29:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xa030000) 21:29:41 executing program 0: shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:41 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r3) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) 21:29:41 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:41 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) 21:29:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xc030000) 21:29:41 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) [ 207.290936][ T6259] loop1: detected capacity change from 0 to 2048 [ 207.306692][ T6259] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 21:29:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xe010000) 21:29:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) [ 207.332677][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:41 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) dup2(0xffffffffffffffff, r0) [ 207.373313][ T6271] loop1: detected capacity change from 0 to 2048 [ 207.388993][ T6271] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 207.414173][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(0x0, 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) 21:29:42 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x18010000) 21:29:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:42 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:42 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:42 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:42 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:42 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:42 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) dup2(0xffffffffffffffff, r0) 21:29:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r2 = inotify_init1(0x0) r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r7 = dup2(r0, r4) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 208.105433][ T6288] loop1: detected capacity change from 0 to 2048 [ 208.128168][ T6288] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 21:29:42 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, r0) 21:29:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) [ 208.155511][ T52] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set [ 208.170689][ T52] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117 [ 208.183067][ T52] EXT4-fs (loop1): This should not happen!! Data will be lost [ 208.183067][ T52] 21:29:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20000000) 21:29:42 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, r0) 21:29:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) [ 208.202936][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:43 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:43 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x24000000) 21:29:43 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, r0) 21:29:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r2 = inotify_init1(0x0) r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r7 = dup2(r0, r4) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) [ 208.941486][ T27] kauditd_printk_skb: 323 callbacks suppressed [ 208.941560][ T27] audit: type=1326 audit(1702502983.262:6706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6317 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:43 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 21:29:43 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 21:29:43 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 208.971826][ T27] audit: type=1326 audit(1702502983.272:6707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 208.995821][ T27] audit: type=1326 audit(1702502983.272:6708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r2 = inotify_init1(0x0) r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r7 = dup2(r0, r4) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 209.019933][ T27] audit: type=1326 audit(1702502983.272:6709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 209.044043][ T27] audit: type=1326 audit(1702502983.272:6710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 209.068619][ T27] audit: type=1326 audit(1702502983.272:6711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 209.092713][ T27] audit: type=1326 audit(1702502983.272:6712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 209.116672][ T27] audit: type=1326 audit(1702502983.272:6713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:43 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 209.140938][ T27] audit: type=1326 audit(1702502983.272:6714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 209.164920][ T27] audit: type=1326 audit(1702502983.272:6715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:44 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r2 = inotify_init1(0x0) r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r7 = dup2(r0, r4) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:44 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0) 21:29:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x24030000) 21:29:44 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0) 21:29:44 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0) 21:29:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x25030000) [ 209.868282][ T6353] blktrace: Concurrent blktraces are not allowed on loop3 21:29:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r2 = inotify_init1(0x0) r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r7 = dup2(r0, r4) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:44 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x35030000) 21:29:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x36030000) 21:29:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 210.723133][ T6380] blktrace: Concurrent blktraces are not allowed on loop3 [ 210.803423][ T6402] blktrace: Concurrent blktraces are not allowed on loop3 21:29:45 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) 21:29:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x37030000) 21:29:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 211.535289][ T6413] loop0: detected capacity change from 0 to 2048 [ 211.547087][ T6413] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 211.574591][ T6405] blktrace: Concurrent blktraces are not allowed on loop3 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) 21:29:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x39030000) 21:29:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0) [ 211.586376][ T6413] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz-executor.0: bg 0: block 234: padding at end of block bitmap is not set [ 211.634688][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:46 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:46 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x60000000) 21:29:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0) 21:29:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0) 21:29:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xc3ffffff) 21:29:46 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(0x0, 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) [ 212.445065][ T6436] blktrace: Concurrent blktraces are not allowed on loop3 [ 212.458024][ T6440] blktrace: Concurrent blktraces are not allowed on loop1 [ 212.513997][ T6453] loop5: detected capacity change from 0 to 2048 [ 212.529016][ T6453] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 212.529185][ T6451] blktrace: Concurrent blktraces are not allowed on loop3 [ 212.548420][ T6454] blktrace: Concurrent blktraces are not allowed on loop1 [ 212.569350][ T26] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set [ 212.584137][ T26] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 212.596423][ T26] EXT4-fs (loop5): This should not happen!! Data will be lost [ 212.596423][ T26] [ 212.606083][ T26] EXT4-fs (loop5): Total free blocks count 0 [ 212.612059][ T26] EXT4-fs (loop5): Free/Dirty block details [ 212.617953][ T26] EXT4-fs (loop5): free_blocks=0 [ 212.622915][ T26] EXT4-fs (loop5): dirty_blocks=16 [ 212.628039][ T26] EXT4-fs (loop5): Block reservation details [ 212.634003][ T26] EXT4-fs (loop5): i_reserved_data_blocks=1 [ 212.640677][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:29:47 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfdfdffff) 21:29:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(0x0, 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(0x0, 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) 21:29:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfeffffff) 21:29:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) [ 213.238581][ T6463] loop5: detected capacity change from 0 to 2048 [ 213.257272][ T6463] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 21:29:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r2 = inotify_init1(0x0) r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r7 = dup2(r0, r4) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001740)) 21:29:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(0x0, 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 213.296452][ T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set [ 213.324644][ T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 213.336891][ T52] EXT4-fs (loop5): This should not happen!! Data will be lost [ 213.336891][ T52] [ 213.340549][ T6479] loop0: detected capacity change from 0 to 2048 [ 213.346549][ T52] EXT4-fs (loop5): Total free blocks count 0 [ 213.358942][ T52] EXT4-fs (loop5): Free/Dirty block details [ 213.364868][ T52] EXT4-fs (loop5): free_blocks=0 [ 213.369867][ T52] EXT4-fs (loop5): dirty_blocks=16 [ 213.375059][ T52] EXT4-fs (loop5): Block reservation details [ 213.378067][ T6479] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 21:29:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(0x0, 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 213.381245][ T52] EXT4-fs (loop5): i_reserved_data_blocks=1 [ 213.400154][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 213.448402][ T6479] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz-executor.0: bg 0: block 234: padding at end of block bitmap is not set [ 213.470845][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 213.483252][ T6483] blktrace: Concurrent blktraces are not allowed on loop3 21:29:48 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffdfd) 21:29:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r2 = inotify_init1(0x0) r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r7 = dup2(r0, r4) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001740)) 21:29:48 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) getpgid(0xffffffffffffffff) r1 = open(0x0, 0xe6942, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) sendfile(r1, r2, 0x0, 0x80040) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) [ 214.109518][ T27] kauditd_printk_skb: 1369 callbacks suppressed [ 214.109529][ T27] audit: type=1326 audit(1702502988.432:8085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.122382][ T6500] loop5: detected capacity change from 0 to 2048 21:29:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 1) [ 214.139923][ T27] audit: type=1326 audit(1702502988.432:8086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.139957][ T27] audit: type=1326 audit(1702502988.432:8087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6494 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 214.139975][ T27] audit: type=1326 audit(1702502988.432:8088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6494 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 214.149922][ T27] audit: type=1326 audit(1702502988.432:8089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.230646][ T6500] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 21:29:48 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 1) dup2(0xffffffffffffffff, r0) [ 214.242295][ T27] audit: type=1326 audit(1702502988.432:8090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.278906][ T27] audit: type=1326 audit(1702502988.432:8091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.302880][ T27] audit: type=1326 audit(1702502988.432:8092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.326961][ T27] audit: type=1326 audit(1702502988.432:8093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.350975][ T27] audit: type=1326 audit(1702502988.432:8094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000 [ 214.379741][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 214.381290][ T6508] FAULT_INJECTION: forcing a failure. [ 214.381290][ T6508] name failslab, interval 1, probability 0, space 0, times 0 [ 214.401501][ T6508] CPU: 1 PID: 6508 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 214.411831][ T6508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 214.421996][ T6508] Call Trace: [ 214.425302][ T6508] [ 214.428268][ T6508] dump_stack_lvl+0xda/0x130 [ 214.432866][ T6508] dump_stack+0x15/0x20 [ 214.437029][ T6508] should_fail_ex+0x21f/0x230 [ 214.441728][ T6508] __should_failslab+0x92/0xa0 [ 214.446550][ T6508] should_failslab+0x9/0x20 [ 214.451047][ T6508] slab_pre_alloc_hook+0x37/0x160 [ 214.456503][ T6508] ? alloc_inode+0x64/0x150 [ 214.460997][ T6508] kmem_cache_alloc_lru+0x47/0x200 [ 214.466105][ T6508] alloc_inode+0x64/0x150 [ 214.470469][ T6508] new_inode_pseudo+0x17/0x70 [ 214.475138][ T6508] __ns_get_path+0xd8/0x220 [ 214.479636][ T6508] ? __put_net+0x70/0x70 [ 214.483946][ T6508] open_related_ns+0x76/0x140 [ 214.488678][ T6508] __tun_chr_ioctl+0x9f3/0x1850 [ 214.493530][ T6508] tun_chr_ioctl+0x27/0x30 [ 214.497943][ T6508] ? tun_chr_poll+0x430/0x430 [ 214.502645][ T6508] __se_sys_ioctl+0xcf/0x140 [ 214.507291][ T6508] __x64_sys_ioctl+0x43/0x50 [ 214.511876][ T6508] do_syscall_64+0x44/0x110 [ 214.516409][ T6508] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 214.522299][ T6508] RIP: 0033:0x7f63dbe93ba9 [ 214.526705][ T6508] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 214.546457][ T6508] RSP: 002b:00007f63db1f50c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:29:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) r6 = dup2(r0, r3) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:48 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xffffffc3) [ 214.554898][ T6508] RAX: ffffffffffffffda RBX: 00007f63dbfb3050 RCX: 00007f63dbe93ba9 [ 214.562863][ T6508] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 214.570828][ T6508] RBP: 00007f63db1f5120 R08: 0000000000000000 R09: 0000000000000000 [ 214.578796][ T6508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.587037][ T6508] R13: 000000000000006e R14: 00007f63dbfb3050 R15: 00007ffd6b7e2e78 [ 214.595223][ T6508] [ 214.635399][ T6516] FAULT_INJECTION: forcing a failure. [ 214.635399][ T6516] name failslab, interval 1, probability 0, space 0, times 0 [ 214.648221][ T6516] CPU: 1 PID: 6516 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 214.658528][ T6516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 214.668681][ T6516] Call Trace: [ 214.671958][ T6516] [ 214.674870][ T6516] dump_stack_lvl+0xda/0x130 [ 214.679499][ T6516] dump_stack+0x15/0x20 [ 214.683709][ T6516] should_fail_ex+0x21f/0x230 [ 214.688434][ T6516] ? getname_flags+0x85/0x360 [ 214.693176][ T6516] __should_failslab+0x92/0xa0 [ 214.697954][ T6516] should_failslab+0x9/0x20 [ 214.702459][ T6516] kmem_cache_alloc+0x4e/0x250 [ 214.707243][ T6516] getname_flags+0x85/0x360 [ 214.711860][ T6516] getname+0x19/0x20 [ 214.715826][ T6516] do_sys_openat2+0x67/0x110 [ 214.720412][ T6516] __x64_sys_openat+0xf3/0x120 [ 214.725173][ T6516] do_syscall_64+0x44/0x110 [ 214.729700][ T6516] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 214.735610][ T6516] RIP: 0033:0x7f03d5f377a0 [ 214.740081][ T6516] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 214.759704][ T6516] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 214.768168][ T6516] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0 [ 214.776195][ T6516] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c 21:29:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 214.784158][ T6516] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000 [ 214.792196][ T6516] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 214.800149][ T6516] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8 [ 214.808105][ T6516] [ 214.816410][ T6511] blktrace: Concurrent blktraces are not allowed on loop3 21:29:49 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 2) dup2(0xffffffffffffffff, r0) 21:29:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 2) 21:29:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:49 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffffe) 21:29:49 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 214.949683][ T6525] FAULT_INJECTION: forcing a failure. [ 214.949683][ T6525] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.962852][ T6525] CPU: 0 PID: 6525 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 214.968124][ T6529] FAULT_INJECTION: forcing a failure. [ 214.968124][ T6529] name failslab, interval 1, probability 0, space 0, times 0 [ 214.973185][ T6525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 214.995969][ T6525] Call Trace: [ 214.999242][ T6525] [ 215.002163][ T6525] dump_stack_lvl+0xda/0x130 [ 215.006776][ T6525] dump_stack+0x15/0x20 [ 215.010942][ T6525] should_fail_ex+0x21f/0x230 [ 215.015701][ T6525] should_fail+0xb/0x10 [ 215.019861][ T6525] should_fail_usercopy+0x1a/0x20 [ 215.024983][ T6525] strncpy_from_user+0x25/0x270 [ 215.029836][ T6525] ? kmem_cache_alloc+0x15a/0x250 [ 215.034878][ T6525] getname_flags+0xb3/0x360 [ 215.039444][ T6525] getname+0x19/0x20 [ 215.043366][ T6525] do_sys_openat2+0x67/0x110 [ 215.047954][ T6525] __x64_sys_openat+0xf3/0x120 [ 215.052717][ T6525] do_syscall_64+0x44/0x110 [ 215.057293][ T6525] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 215.063221][ T6525] RIP: 0033:0x7f03d5f377a0 [ 215.067623][ T6525] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 215.087303][ T6525] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.095797][ T6525] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0 [ 215.103772][ T6525] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c [ 215.111739][ T6525] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000 [ 215.119735][ T6525] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 215.127697][ T6525] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8 [ 215.135691][ T6525] [ 215.138752][ T6529] CPU: 1 PID: 6529 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 215.149097][ T6529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 215.159204][ T6529] Call Trace: [ 215.162470][ T6529] [ 215.165402][ T6529] dump_stack_lvl+0xda/0x130 [ 215.170015][ T6529] dump_stack+0x15/0x20 [ 215.174254][ T6529] should_fail_ex+0x21f/0x230 [ 215.178944][ T6529] ? memcg_list_lru_alloc+0x135/0x750 [ 215.184384][ T6529] __should_failslab+0x92/0xa0 [ 215.189174][ T6529] should_failslab+0x9/0x20 [ 215.193769][ T6529] __kmem_cache_alloc_node+0x4e/0x210 [ 215.199227][ T6529] ? __rcu_read_unlock+0x4d/0x70 [ 215.204169][ T6529] ? memcg_list_lru_alloc+0x135/0x750 [ 215.209586][ T6529] __kmalloc+0x95/0x1a0 [ 215.213741][ T6529] memcg_list_lru_alloc+0x135/0x750 [ 215.218983][ T6529] ? update_load_avg+0x1f7/0x760 [ 215.223920][ T6529] slab_pre_alloc_hook+0xe0/0x160 [ 215.229033][ T6529] ? alloc_inode+0x64/0x150 [ 215.233530][ T6529] kmem_cache_alloc_lru+0x47/0x200 [ 215.238707][ T6529] alloc_inode+0x64/0x150 [ 215.243032][ T6529] new_inode_pseudo+0x17/0x70 [ 215.247712][ T6529] __ns_get_path+0xd8/0x220 [ 215.252211][ T6529] ? __put_net+0x70/0x70 [ 215.256621][ T6529] open_related_ns+0x76/0x140 [ 215.261330][ T6529] __tun_chr_ioctl+0x9f3/0x1850 [ 215.266232][ T6529] tun_chr_ioctl+0x27/0x30 [ 215.270798][ T6529] ? tun_chr_poll+0x430/0x430 [ 215.275561][ T6529] __se_sys_ioctl+0xcf/0x140 [ 215.280195][ T6529] __x64_sys_ioctl+0x43/0x50 [ 215.284810][ T6529] do_syscall_64+0x44/0x110 [ 215.289315][ T6529] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 215.295204][ T6529] RIP: 0033:0x7f63dbe93ba9 [ 215.299645][ T6529] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 215.319344][ T6529] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 215.327833][ T6529] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9 [ 215.335847][ T6529] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 21:29:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:49 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 3) dup2(0xffffffffffffffff, r0) [ 215.343828][ T6529] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000 [ 215.351791][ T6529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.359752][ T6529] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78 [ 215.367854][ T6529] [ 215.407375][ T6544] FAULT_INJECTION: forcing a failure. [ 215.407375][ T6544] name failslab, interval 1, probability 0, space 0, times 0 [ 215.420049][ T6544] CPU: 0 PID: 6544 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 215.430365][ T6544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 215.440561][ T6544] Call Trace: [ 215.443823][ T6544] [ 215.446780][ T6544] dump_stack_lvl+0xda/0x130 [ 215.451426][ T6544] dump_stack+0x15/0x20 [ 215.455648][ T6544] should_fail_ex+0x21f/0x230 [ 215.460417][ T6544] ? alloc_empty_file+0xd0/0x310 [ 215.465400][ T6544] __should_failslab+0x92/0xa0 [ 215.470223][ T6544] should_failslab+0x9/0x20 [ 215.474720][ T6544] kmem_cache_alloc+0x4e/0x250 [ 215.479483][ T6544] alloc_empty_file+0xd0/0x310 [ 215.484247][ T6544] path_openat+0x69/0x1d70 [ 215.488672][ T6544] ? _parse_integer+0x27/0x30 [ 215.493533][ T6544] ? kstrtoull+0x110/0x140 [ 215.498016][ T6544] ? kstrtouint+0x77/0xb0 [ 215.502418][ T6544] do_filp_open+0xf6/0x200 [ 215.506829][ T6544] do_sys_openat2+0xab/0x110 [ 215.511426][ T6544] __x64_sys_openat+0xf3/0x120 [ 215.516257][ T6544] do_syscall_64+0x44/0x110 [ 215.520763][ T6544] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 215.526724][ T6544] RIP: 0033:0x7f03d5f377a0 [ 215.531131][ T6544] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 21:29:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:49 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 4) dup2(0xffffffffffffffff, r0) 21:29:49 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000000000000) 21:29:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 215.550729][ T6544] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.559143][ T6544] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0 [ 215.567125][ T6544] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c [ 215.575085][ T6544] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000 [ 215.583134][ T6544] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 215.591112][ T6544] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8 [ 215.599172][ T6544] [ 215.645374][ T6554] FAULT_INJECTION: forcing a failure. [ 215.645374][ T6554] name failslab, interval 1, probability 0, space 0, times 0 [ 215.658033][ T6554] CPU: 1 PID: 6554 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 215.668348][ T6554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 215.678450][ T6554] Call Trace: [ 215.681718][ T6554] [ 215.684635][ T6554] dump_stack_lvl+0xda/0x130 [ 215.689260][ T6554] dump_stack+0x15/0x20 [ 215.693487][ T6554] should_fail_ex+0x21f/0x230 [ 215.698167][ T6554] ? security_file_alloc+0x32/0xd0 [ 215.703320][ T6554] __should_failslab+0x92/0xa0 [ 215.708099][ T6554] should_failslab+0x9/0x20 [ 215.712659][ T6554] kmem_cache_alloc+0x4e/0x250 [ 215.717417][ T6554] ? alloc_empty_file+0xd0/0x310 [ 215.722350][ T6554] security_file_alloc+0x32/0xd0 [ 215.727281][ T6554] alloc_empty_file+0x121/0x310 [ 215.732129][ T6554] path_openat+0x69/0x1d70 [ 215.736622][ T6554] ? _parse_integer+0x27/0x30 [ 215.741296][ T6554] ? kstrtoull+0x110/0x140 [ 215.745751][ T6554] ? kstrtouint+0x77/0xb0 [ 215.750137][ T6554] do_filp_open+0xf6/0x200 [ 215.754735][ T6554] do_sys_openat2+0xab/0x110 [ 215.759379][ T6554] __x64_sys_openat+0xf3/0x120 [ 215.764212][ T6554] do_syscall_64+0x44/0x110 [ 215.768832][ T6554] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 215.774752][ T6554] RIP: 0033:0x7f03d5f377a0 [ 215.779162][ T6554] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 215.799284][ T6554] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.807702][ T6554] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0 [ 215.816097][ T6554] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c [ 215.824058][ T6554] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000 [ 215.832065][ T6554] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 21:29:50 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 3) 21:29:50 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:50 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 215.840028][ T6554] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8 [ 215.847999][ T6554] 21:29:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0) r6 = dup2(r0, r3) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:50 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 5) dup2(0xffffffffffffffff, r0) 21:29:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3000000000000) [ 215.912928][ T6561] FAULT_INJECTION: forcing a failure. [ 215.912928][ T6561] name failslab, interval 1, probability 0, space 0, times 0 [ 215.918504][ T6567] FAULT_INJECTION: forcing a failure. [ 215.918504][ T6567] name failslab, interval 1, probability 0, space 0, times 0 [ 215.925617][ T6561] CPU: 1 PID: 6561 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 215.948781][ T6561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 215.958865][ T6561] Call Trace: [ 215.962133][ T6561] [ 215.965075][ T6561] dump_stack_lvl+0xda/0x130 [ 215.969669][ T6561] dump_stack+0x15/0x20 [ 215.973832][ T6561] should_fail_ex+0x21f/0x230 [ 215.978510][ T6561] ? memcg_list_lru_alloc+0x1e1/0x750 [ 215.983937][ T6561] __should_failslab+0x92/0xa0 [ 215.988705][ T6561] should_failslab+0x9/0x20 [ 215.993228][ T6561] __kmem_cache_alloc_node+0x4e/0x210 [ 215.998656][ T6561] ? __rcu_read_unlock+0x4d/0x70 [ 216.003629][ T6561] ? memcg_list_lru_alloc+0x1e1/0x750 [ 216.009114][ T6561] __kmalloc+0x95/0x1a0 [ 216.013351][ T6561] memcg_list_lru_alloc+0x1e1/0x750 [ 216.018554][ T6561] ? update_load_avg+0x1f7/0x760 [ 216.023492][ T6561] slab_pre_alloc_hook+0xe0/0x160 [ 216.028522][ T6561] ? alloc_inode+0x64/0x150 [ 216.033174][ T6561] kmem_cache_alloc_lru+0x47/0x200 [ 216.038403][ T6561] alloc_inode+0x64/0x150 [ 216.042726][ T6561] new_inode_pseudo+0x17/0x70 [ 216.047471][ T6561] __ns_get_path+0xd8/0x220 [ 216.051965][ T6561] ? __put_net+0x70/0x70 [ 216.056207][ T6561] open_related_ns+0x76/0x140 [ 216.060908][ T6561] __tun_chr_ioctl+0x9f3/0x1850 [ 216.065777][ T6561] tun_chr_ioctl+0x27/0x30 [ 216.070299][ T6561] ? tun_chr_poll+0x430/0x430 [ 216.075007][ T6561] __se_sys_ioctl+0xcf/0x140 [ 216.079599][ T6561] __x64_sys_ioctl+0x43/0x50 [ 216.084190][ T6561] do_syscall_64+0x44/0x110 [ 216.088700][ T6561] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 216.094683][ T6561] RIP: 0033:0x7f63dbe93ba9 [ 216.099143][ T6561] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 216.118742][ T6561] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 216.127170][ T6561] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9 [ 216.135131][ T6561] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 216.143135][ T6561] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000 [ 216.151145][ T6561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.159110][ T6561] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78 [ 216.167074][ T6561] [ 216.170091][ T6567] CPU: 0 PID: 6567 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 216.180613][ T6567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 216.190672][ T6567] Call Trace: [ 216.194004][ T6567] [ 216.196925][ T6567] dump_stack_lvl+0xda/0x130 [ 216.201522][ T6567] dump_stack+0x15/0x20 [ 216.205739][ T6567] should_fail_ex+0x21f/0x230 [ 216.210626][ T6567] ? usbdev_open+0x4d/0x480 [ 216.215216][ T6567] __should_failslab+0x92/0xa0 [ 216.220011][ T6567] should_failslab+0x9/0x20 [ 216.224572][ T6567] __kmem_cache_alloc_node+0x4e/0x210 [ 216.229946][ T6567] ? usbdev_open+0x4d/0x480 [ 216.234521][ T6567] kmalloc_trace+0x2a/0xa0 [ 216.238931][ T6567] usbdev_open+0x4d/0x480 [ 216.243271][ T6567] ? chrdev_open+0x311/0x390 [ 216.247876][ T6567] chrdev_open+0x322/0x390 [ 216.252286][ T6567] ? cd_forget+0xe0/0xe0 [ 216.256609][ T6567] do_dentry_open+0x635/0xbd0 [ 216.261335][ T6567] vfs_open+0x4a/0x50 [ 216.265308][ T6567] path_openat+0x1819/0x1d70 [ 216.269889][ T6567] ? _parse_integer+0x27/0x30 [ 216.274562][ T6567] do_filp_open+0xf6/0x200 [ 216.279025][ T6567] do_sys_openat2+0xab/0x110 [ 216.283608][ T6567] __x64_sys_openat+0xf3/0x120 [ 216.288378][ T6567] do_syscall_64+0x44/0x110 [ 216.292935][ T6567] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 216.298824][ T6567] RIP: 0033:0x7f03d5f377a0 [ 216.303224][ T6567] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 216.322819][ T6567] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 216.331231][ T6567] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0 [ 216.339236][ T6567] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c [ 216.347195][ T6567] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000 [ 216.355201][ T6567] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 21:29:50 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 6) dup2(0xffffffffffffffff, r0) 21:29:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 4) [ 216.363192][ T6567] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8 [ 216.371219][ T6567] [ 216.427749][ T6575] FAULT_INJECTION: forcing a failure. [ 216.427749][ T6575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.434050][ T6565] blktrace: Concurrent blktraces are not allowed on loop3 [ 216.440824][ T6575] CPU: 1 PID: 6575 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 216.454189][ T6577] FAULT_INJECTION: forcing a failure. [ 216.454189][ T6577] name failslab, interval 1, probability 0, space 0, times 0 [ 216.458218][ T6575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 216.458233][ T6575] Call Trace: [ 216.458239][ T6575] [ 216.458245][ T6575] dump_stack_lvl+0xda/0x130 [ 216.458280][ T6575] dump_stack+0x15/0x20 [ 216.495777][ T6575] should_fail_ex+0x21f/0x230 [ 216.500490][ T6575] should_fail+0xb/0x10 [ 216.504642][ T6575] should_fail_usercopy+0x1a/0x20 [ 216.509761][ T6575] _copy_to_user+0x1e/0x90 [ 216.514182][ T6575] simple_read_from_buffer+0xa0/0x110 [ 216.519630][ T6575] proc_fail_nth_read+0xfc/0x140 [ 216.524569][ T6575] ? proc_fault_inject_write+0x210/0x210 [ 216.530199][ T6575] vfs_read+0x1a4/0x590 [ 216.534358][ T6575] ? mutex_lock+0xd/0x30 [ 216.538599][ T6575] ksys_read+0xeb/0x1a0 [ 216.542811][ T6575] __x64_sys_read+0x42/0x50 [ 216.547393][ T6575] do_syscall_64+0x44/0x110 [ 216.551895][ T6575] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 216.557781][ T6575] RIP: 0033:0x7f03d5f3784c [ 216.562260][ T6575] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 216.581922][ T6575] RSP: 002b:00007f03d52bb0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 216.590443][ T6575] RAX: ffffffffffffffda RBX: 00007f03d6057f80 RCX: 00007f03d5f3784c [ 216.598427][ T6575] RDX: 000000000000000f RSI: 00007f03d52bb130 RDI: 0000000000000003 [ 216.606398][ T6575] RBP: 00007f03d52bb120 R08: 0000000000000000 R09: 0000000000000000 [ 216.614457][ T6575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 21:29:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xb000000000000) 21:29:50 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, r0) [ 216.622420][ T6575] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8 [ 216.630460][ T6575] [ 216.633468][ T6577] CPU: 0 PID: 6577 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 216.643889][ T6577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 216.653955][ T6577] Call Trace: [ 216.657241][ T6577] [ 216.660193][ T6577] dump_stack_lvl+0xda/0x130 [ 216.664929][ T6577] dump_stack+0x15/0x20 [ 216.669100][ T6577] should_fail_ex+0x21f/0x230 [ 216.673788][ T6577] ? security_inode_alloc+0x32/0xd0 21:29:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x2) dup2(0xffffffffffffffff, r0) [ 216.678996][ T6577] __should_failslab+0x92/0xa0 [ 216.683768][ T6577] should_failslab+0x9/0x20 [ 216.688340][ T6577] kmem_cache_alloc+0x4e/0x250 [ 216.693175][ T6577] security_inode_alloc+0x32/0xd0 [ 216.698192][ T6577] inode_init_always+0x428/0x460 [ 216.703122][ T6577] alloc_inode+0x77/0x150 [ 216.707497][ T6577] new_inode_pseudo+0x17/0x70 [ 216.712175][ T6577] __ns_get_path+0xd8/0x220 [ 216.716753][ T6577] ? __put_net+0x70/0x70 [ 216.721077][ T6577] open_related_ns+0x76/0x140 21:29:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3) dup2(0xffffffffffffffff, r0) [ 216.725772][ T6577] __tun_chr_ioctl+0x9f3/0x1850 [ 216.730655][ T6577] tun_chr_ioctl+0x27/0x30 [ 216.735110][ T6577] ? tun_chr_poll+0x430/0x430 [ 216.739810][ T6577] __se_sys_ioctl+0xcf/0x140 [ 216.744417][ T6577] __x64_sys_ioctl+0x43/0x50 [ 216.749111][ T6577] do_syscall_64+0x44/0x110 [ 216.753699][ T6577] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 216.759649][ T6577] RIP: 0033:0x7f63dbe93ba9 21:29:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4) dup2(0xffffffffffffffff, r0) [ 216.764188][ T6577] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 216.783929][ T6577] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 216.792322][ T6577] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9 [ 216.800343][ T6577] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 216.808375][ T6577] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000 [ 216.816351][ T6577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 21:29:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) r6 = dup2(r0, r3) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x18) dup2(0xffffffffffffffff, r0) 21:29:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x100000000000000) [ 216.824324][ T6577] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78 [ 216.832368][ T6577] 21:29:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc0) dup2(0xffffffffffffffff, r0) 21:29:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 5) 21:29:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe0) dup2(0xffffffffffffffff, r0) 21:29:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 216.959815][ T6610] FAULT_INJECTION: forcing a failure. [ 216.959815][ T6610] name failslab, interval 1, probability 0, space 0, times 0 [ 216.972541][ T6610] CPU: 1 PID: 6610 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 216.982851][ T6610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 216.992898][ T6610] Call Trace: [ 216.996248][ T6610] [ 216.999162][ T6610] dump_stack_lvl+0xda/0x130 [ 217.003810][ T6610] dump_stack+0x15/0x20 [ 217.008036][ T6610] should_fail_ex+0x21f/0x230 [ 217.012757][ T6610] ? memcg_list_lru_alloc+0x1e1/0x750 [ 217.018214][ T6610] __should_failslab+0x92/0xa0 [ 217.023057][ T6610] should_failslab+0x9/0x20 [ 217.027573][ T6610] __kmem_cache_alloc_node+0x4e/0x210 [ 217.033005][ T6610] ? __rcu_read_unlock+0x4d/0x70 [ 217.037997][ T6610] ? memcg_list_lru_alloc+0x1e1/0x750 [ 217.043442][ T6610] __kmalloc+0x95/0x1a0 [ 217.047595][ T6610] memcg_list_lru_alloc+0x1e1/0x750 [ 217.052920][ T6610] slab_pre_alloc_hook+0xe0/0x160 [ 217.058037][ T6610] ? __d_alloc+0x3d/0x380 [ 217.062362][ T6610] kmem_cache_alloc_lru+0x47/0x200 [ 217.067611][ T6610] __d_alloc+0x3d/0x380 [ 217.071769][ T6610] d_alloc_anon+0x17/0x20 [ 217.076098][ T6610] __ns_get_path+0x165/0x220 [ 217.080725][ T6610] ? __put_net+0x70/0x70 [ 217.085082][ T6610] open_related_ns+0x76/0x140 [ 217.089871][ T6610] __tun_chr_ioctl+0x9f3/0x1850 [ 217.094897][ T6610] tun_chr_ioctl+0x27/0x30 [ 217.099351][ T6610] ? tun_chr_poll+0x430/0x430 [ 217.104071][ T6610] __se_sys_ioctl+0xcf/0x140 [ 217.108685][ T6610] __x64_sys_ioctl+0x43/0x50 [ 217.113265][ T6610] do_syscall_64+0x44/0x110 [ 217.117803][ T6610] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 217.123794][ T6610] RIP: 0033:0x7f63dbe93ba9 [ 217.128195][ T6610] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.147827][ T6610] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.156368][ T6610] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9 [ 217.164424][ T6610] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 217.172383][ T6610] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000 [ 217.180340][ T6610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.188300][ T6610] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78 [ 217.196267][ T6610] 21:29:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) r6 = dup2(r0, r3) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x103000000000000) 21:29:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x140) dup2(0xffffffffffffffff, r0) 21:29:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(0x0, 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 6) [ 217.616232][ T6622] FAULT_INJECTION: forcing a failure. [ 217.616232][ T6622] name failslab, interval 1, probability 0, space 0, times 0 [ 217.629071][ T6622] CPU: 1 PID: 6622 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 217.639379][ T6622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 217.649545][ T6622] Call Trace: [ 217.652805][ T6622] [ 217.655717][ T6622] dump_stack_lvl+0xda/0x130 [ 217.660332][ T6622] dump_stack+0x15/0x20 [ 217.664505][ T6622] should_fail_ex+0x21f/0x230 [ 217.669193][ T6622] ? alloc_empty_file+0xd0/0x310 [ 217.674195][ T6622] __should_failslab+0x92/0xa0 [ 217.678991][ T6622] should_failslab+0x9/0x20 [ 217.683475][ T6622] kmem_cache_alloc+0x4e/0x250 [ 217.688230][ T6622] ? __put_net+0x70/0x70 [ 217.692590][ T6622] alloc_empty_file+0xd0/0x310 [ 217.697404][ T6622] ? __put_net+0x70/0x70 [ 217.701673][ T6622] dentry_open+0x31/0xc0 [ 217.705961][ T6622] open_related_ns+0xbe/0x140 [ 217.710696][ T6622] __tun_chr_ioctl+0x9f3/0x1850 [ 217.715570][ T6622] tun_chr_ioctl+0x27/0x30 [ 217.720031][ T6622] ? tun_chr_poll+0x430/0x430 [ 217.724898][ T6622] __se_sys_ioctl+0xcf/0x140 [ 217.729503][ T6622] __x64_sys_ioctl+0x43/0x50 [ 217.734161][ T6622] do_syscall_64+0x44/0x110 [ 217.738669][ T6622] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 217.744557][ T6622] RIP: 0033:0x7f63dbe93ba9 [ 217.748957][ T6622] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.768576][ T6622] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.776973][ T6622] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9 [ 217.784929][ T6622] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 217.792885][ T6622] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000 [ 217.800845][ T6622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.808820][ T6622] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78 21:29:52 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(0x0, 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x300) dup2(0xffffffffffffffff, r0) 21:29:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1ee000000000000) [ 217.816846][ T6622] 21:29:52 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(0x0, 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) r6 = dup2(r0, r3) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1800) dup2(0xffffffffffffffff, r0) [ 217.928718][ T6635] blktrace: Concurrent blktraces are not allowed on loop3 21:29:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 7) 21:29:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200000000000000) 21:29:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x2000) dup2(0xffffffffffffffff, r0) 21:29:52 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) socket(0x10, 0x3, 0x0) r5 = dup2(r0, r3) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 218.470405][ T6644] FAULT_INJECTION: forcing a failure. [ 218.470405][ T6644] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 218.483553][ T6644] CPU: 0 PID: 6644 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0 [ 218.493863][ T6644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 218.503902][ T6644] Call Trace: [ 218.507186][ T6644] [ 218.510110][ T6644] dump_stack_lvl+0xda/0x130 21:29:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3f00) dup2(0xffffffffffffffff, r0) [ 218.511754][ T6649] blktrace: Concurrent blktraces are not allowed on loop3 [ 218.514702][ T6644] dump_stack+0x15/0x20 [ 218.525968][ T6644] should_fail_ex+0x21f/0x230 [ 218.530707][ T6644] should_fail+0xb/0x10 [ 218.534901][ T6644] should_fail_usercopy+0x1a/0x20 [ 218.539973][ T6644] _copy_from_user+0x1e/0xd0 [ 218.544666][ T6644] kstrtouint_from_user+0x76/0xe0 [ 218.549772][ T6644] ? 0xffffffff81000000 [ 218.553965][ T6644] proc_fail_nth_write+0x4f/0x150 [ 218.559001][ T6644] ? proc_fail_nth_read+0x140/0x140 [ 218.564280][ T6644] vfs_write+0x27a/0x790 21:29:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000) dup2(0xffffffffffffffff, r0) [ 218.568541][ T6644] ? mutex_lock+0xd/0x30 [ 218.572841][ T6644] ksys_write+0xeb/0x1a0 [ 218.577165][ T6644] __x64_sys_write+0x42/0x50 [ 218.581739][ T6644] do_syscall_64+0x44/0x110 [ 218.586247][ T6644] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 218.592227][ T6644] RIP: 0033:0x7f63dbe928ef [ 218.596649][ T6644] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 21:29:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001) dup2(0xffffffffffffffff, r0) 21:29:53 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = dup2(r0, r3) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc000) dup2(0xffffffffffffffff, r0) [ 218.616443][ T6644] RSP: 002b:00007f63db2160c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 218.624859][ T6644] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f63dbe928ef [ 218.632826][ T6644] RDX: 0000000000000001 RSI: 00007f63db216130 RDI: 0000000000000004 [ 218.640782][ T6644] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000 [ 218.648746][ T6644] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 218.656719][ T6644] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78 [ 218.664777][ T6644] 21:29:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = dup2(r0, r3) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x400000000000000) 21:29:53 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe000) dup2(0xffffffffffffffff, r0) 21:29:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x54e3, 0x0) [ 219.325961][ T27] kauditd_printk_skb: 908 callbacks suppressed [ 219.325973][ T27] audit: type=1326 audit(1702502993.642:9003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6672 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 21:29:53 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(0x0, 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 219.356220][ T27] audit: type=1326 audit(1702502993.642:9004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6672 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 219.381058][ T27] audit: type=1326 audit(1702502993.652:9005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x10040) dup2(0xffffffffffffffff, r0) 21:29:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x200000) dup2(0xffffffffffffffff, r0) [ 219.405062][ T27] audit: type=1326 audit(1702502993.652:9006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 219.429004][ T27] audit: type=1326 audit(1702502993.652:9007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 219.452935][ T27] audit: type=1326 audit(1702502993.652:9008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1000000) dup2(0xffffffffffffffff, r0) 21:29:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x2000000) dup2(0xffffffffffffffff, r0) [ 219.476903][ T27] audit: type=1326 audit(1702502993.652:9009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 219.500936][ T27] audit: type=1326 audit(1702502993.652:9010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3000000) dup2(0xffffffffffffffff, r0) [ 219.524850][ T27] audit: type=1326 audit(1702502993.652:9011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 219.548779][ T27] audit: type=1326 audit(1702502993.652:9012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:54 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000000) dup2(0xffffffffffffffff, r0) 21:29:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) r5 = dup2(r0, r3) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x503000000000000) 21:29:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x2, 0x0) 21:29:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(0x0, 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xbd00380) dup2(0xffffffffffffffff, r0) 21:29:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3}) r5 = dup2(r0, r3) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(0x0, 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x600000000000000) 21:29:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x18000000) dup2(0xffffffffffffffff, r0) [ 220.248373][ T6701] blktrace: Concurrent blktraces are not allowed on loop3 21:29:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x4b47, 0x0) [ 220.341740][ T6713] blktrace: Concurrent blktraces are not allowed on loop3 21:29:55 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3f000000) dup2(0xffffffffffffffff, r0) 21:29:55 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x0, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3}) r4 = dup2(r0, r2) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x603000000000000) 21:29:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x4b49, 0x0) 21:29:55 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x0, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x40000000) dup2(0xffffffffffffffff, r0) 21:29:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x700000000000000) 21:29:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x541b, 0x0) [ 221.111036][ T6730] blktrace: Concurrent blktraces are not allowed on loop3 21:29:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x40000100) dup2(0xffffffffffffffff, r0) [ 221.177025][ T6740] blktrace: Concurrent blktraces are not allowed on loop3 21:29:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:56 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:56 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x0, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x5421, 0x0) 21:29:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x803000000000000) 21:29:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x40010000) dup2(0xffffffffffffffff, r0) 21:29:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4bdfffff) dup2(0xffffffffffffffff, r0) 21:29:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4fdfffff) dup2(0xffffffffffffffff, r0) 21:29:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x8003d00b) dup2(0xffffffffffffffff, r0) 21:29:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc0000000) dup2(0xffffffffffffffff, r0) 21:29:56 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid}) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xa03000000000000) [ 221.977459][ T6751] blktrace: Concurrent blktraces are not allowed on loop3 [ 222.036629][ T6771] blktrace: Concurrent blktraces are not allowed on loop3 21:29:57 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x5450, 0x0) 21:29:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe0000000) dup2(0xffffffffffffffff, r0) 21:29:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xc03000000000000) 21:29:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf3ffffff) dup2(0xffffffffffffffff, r0) 21:29:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf6ffffff) dup2(0xffffffffffffffff, r0) 21:29:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xffffdf4b) dup2(0xffffffffffffffff, r0) 21:29:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xe01000000000000) 21:29:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xffffdf4f) dup2(0xffffffffffffffff, r0) 21:29:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x0) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:57 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xfffffff3) dup2(0xffffffffffffffff, r0) 21:29:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x5451, 0x0) 21:29:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1801000000000000) 21:29:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(0x0, 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xfffffff6) dup2(0xffffffffffffffff, r0) 21:29:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1000000000000) dup2(0xffffffffffffffff, r0) 21:29:58 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(0x0, 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x20000000000000) dup2(0xffffffffffffffff, r0) 21:29:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000000000000000) 21:29:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 223.701260][ T6803] blktrace: Concurrent blktraces are not allowed on loop3 21:29:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x5452, 0x0) 21:29:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x100000000000000) dup2(0xffffffffffffffff, r0) 21:29:58 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(0x0, 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2400000000000000) 21:29:58 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 224.495656][ T27] kauditd_printk_skb: 787 callbacks suppressed [ 224.495670][ T27] audit: type=1326 audit(1702502998.812:9800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 224.525813][ T27] audit: type=1326 audit(1702502998.812:9801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 224.553525][ T27] audit: type=1326 audit(1702502998.822:9802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 224.577575][ T27] audit: type=1326 audit(1702502998.822:9803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 224.601736][ T27] audit: type=1326 audit(1702502998.822:9804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x200000000000000) dup2(0xffffffffffffffff, r0) [ 224.625838][ T27] audit: type=1326 audit(1702502998.822:9805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 224.649895][ T27] audit: type=1326 audit(1702502998.822:9806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x300000000000000) dup2(0xffffffffffffffff, r0) 21:29:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2403000000000000) 21:29:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 224.673876][ T27] audit: type=1326 audit(1702502998.822:9807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 224.697866][ T27] audit: type=1326 audit(1702502998.822:9808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 224.721786][ T27] audit: type=1326 audit(1702502998.822:9809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:29:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x5460, 0x0) 21:29:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x400000000000000) dup2(0xffffffffffffffff, r0) 21:29:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1800000000000000) dup2(0xffffffffffffffff, r0) 21:29:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 224.827127][ T6851] blktrace: Concurrent blktraces are not allowed on loop3 [ 224.890189][ T6861] blktrace: Concurrent blktraces are not allowed on loop3 21:29:59 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:29:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2503000000000000) 21:29:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3f00000000000000) dup2(0xffffffffffffffff, r0) 21:29:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x8924, 0x0) 21:29:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:29:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r1 = dup2(0xffffffffffffffff, r0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:29:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000000000000000) dup2(0xffffffffffffffff, r0) 21:29:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3503000000000000) 21:29:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 225.396544][ T6870] blktrace: Concurrent blktraces are not allowed on loop3 21:29:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x8927, 0x0) 21:30:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3603000000000000) 21:30:00 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000010000000000) dup2(0xffffffffffffffff, r0) 21:30:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r1 = dup2(0xffffffffffffffff, r0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x894c, 0x0) 21:30:00 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454c8, 0x0) 21:30:00 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001000000000000) dup2(0xffffffffffffffff, r0) 21:30:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3703000000000000) 21:30:00 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4bdfffff00000000) dup2(0xffffffffffffffff, r0) 21:30:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r1 = dup2(0xffffffffffffffff, r0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:01 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454c9, 0x0) 21:30:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3903000000000000) 21:30:01 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:01 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4fdfffff00000000) dup2(0xffffffffffffffff, r0) 21:30:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:01 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x8003d00b00000000) dup2(0xffffffffffffffff, r0) 21:30:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:01 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454ca, 0x0) 21:30:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6000000000000000) [ 227.108007][ T6934] blktrace: Concurrent blktraces are not allowed on loop3 21:30:01 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc000000000000000) dup2(0xffffffffffffffff, r0) 21:30:02 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:02 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xc3ffffff00000000) 21:30:02 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe000000000000000) dup2(0xffffffffffffffff, r0) 21:30:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cb, 0x0) 21:30:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:02 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfdfdffff00000000) 21:30:02 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf3ffffff00000000) dup2(0xffffffffffffffff, r0) 21:30:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cc, 0x0) 21:30:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 228.088824][ T6973] blktrace: Concurrent blktraces are not allowed on loop3 21:30:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfeffffff00000000) 21:30:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf6ffffff00000000) dup2(0xffffffffffffffff, r0) 21:30:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:03 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:30:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454ce, 0x0) 21:30:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xffffffff00000000) dup2(0xffffffffffffffff, r0) 21:30:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) [ 228.836384][ T6978] blktrace: Concurrent blktraces are not allowed on loop3 21:30:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454d0, 0x0) 21:30:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1d1100) r1 = dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000000)={0x621e, 0x1c, [{0xb}, {0x6, 0x1}, {0x7, 0x1}, {0x9, 0x1}, {0x7}, {0x6}, {0xe}, {0x0, 0x1}, {0xf, 0x1}, {0xf, 0x1}, {0x0, 0x1}, {0xe, 0x1}, {0xe}, {0x6}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0xc}, {0x1, 0x1}, {0xb, 0x1}, {0xa}, {0x4}, {0xb}, {0x9, 0x1}, {0x9, 0x1}]}) 21:30:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async) 21:30:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1d1100) r1 = dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000000)={0x621e, 0x1c, [{0xb}, {0x6, 0x1}, {0x7, 0x1}, {0x9, 0x1}, {0x7}, {0x6}, {0xe}, {0x0, 0x1}, {0xf, 0x1}, {0xf, 0x1}, {0x0, 0x1}, {0xe, 0x1}, {0xe}, {0x6}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0xc}, {0x1, 0x1}, {0xb, 0x1}, {0xa}, {0x4}, {0xb}, {0x9, 0x1}, {0x9, 0x1}]}) 21:30:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1d1100) dup2(0xffffffffffffffff, r0) (async) r1 = dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000000)={0x621e, 0x1c, [{0xb}, {0x6, 0x1}, {0x7, 0x1}, {0x9, 0x1}, {0x7}, {0x6}, {0xe}, {0x0, 0x1}, {0xf, 0x1}, {0xf, 0x1}, {0x0, 0x1}, {0xe, 0x1}, {0xe}, {0x6}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0xc}, {0x1, 0x1}, {0xb, 0x1}, {0xa}, {0x4}, {0xb}, {0x9, 0x1}, {0x9, 0x1}]}) 21:30:03 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x87, @empty, 0x4e21, 0x1, 'ovf\x00', 0x1, 0x1, 0x60}, {@multicast2, 0x4e20, 0x0, 0x7f, 0x40, 0x7}}, 0x44) 21:30:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454d1, 0x0) 21:30:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) [ 229.640740][ T27] kauditd_printk_skb: 979 callbacks suppressed [ 229.640751][ T27] audit: type=1326 audit(1702503003.962:10789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7013 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 229.671070][ T27] audit: type=1326 audit(1702503003.962:10790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7013 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000 [ 229.689431][ T7016] blktrace: Concurrent blktraces are not allowed on loop3 [ 229.695395][ T27] audit: type=1326 audit(1702503003.972:10791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:30:04 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x87, @empty, 0x4e21, 0x1, 'ovf\x00', 0x1, 0x1, 0x60}, {@multicast2, 0x4e20, 0x0, 0x7f, 0x40, 0x7}}, 0x44) 21:30:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840), 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) [ 229.726331][ T27] audit: type=1326 audit(1702503003.972:10792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 229.750336][ T27] audit: type=1326 audit(1702503003.972:10793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:30:04 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x87, @empty, 0x4e21, 0x1, 'ovf\x00', 0x1, 0x1, 0x60}, {@multicast2, 0x4e20, 0x0, 0x7f, 0x40, 0x7}}, 0x44) [ 229.774405][ T27] audit: type=1326 audit(1702503003.972:10794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 229.798495][ T27] audit: type=1326 audit(1702503003.972:10795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 229.822508][ T27] audit: type=1326 audit(1702503003.972:10796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 229.846574][ T27] audit: type=1326 audit(1702503003.972:10797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:30:04 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) write$eventfd(r1, &(0x7f0000000340), 0x8) openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r5 = dup2(r3, r4) write$eventfd(r4, &(0x7f0000000340), 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r6, r7) read$eventfd(r6, &(0x7f0000000300), 0x8) r8 = syz_open_procfs$pagemap(0x0, &(0x7f00000001c0)) write$binfmt_script(r8, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, '!C^:N'}, {0x20, '^'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '$:#},-'}], 0xa, "0e85c46b05a3a66ceb25df58e58897e35038ca1028c7397619ac6dd447b8ceac005b187f57c8b92e9268a3bca38294a94d76d662d80fe721bac925a7f3e00604d1"}, 0xbf) accept4$nfc_llcp(r5, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80800) dup2(r2, r4) 21:30:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840), 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 229.870600][ T27] audit: type=1326 audit(1702503003.972:10798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 229.967107][ T7041] blktrace: Concurrent blktraces are not allowed on loop3 21:30:04 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840), 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x80) 21:30:04 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) write$eventfd(r1, &(0x7f0000000340), 0x8) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(r2, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r5 = dup2(r3, r4) (async) write$eventfd(r4, &(0x7f0000000340), 0x8) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r6, r7) read$eventfd(r6, &(0x7f0000000300), 0x8) (async) r8 = syz_open_procfs$pagemap(0x0, &(0x7f00000001c0)) write$binfmt_script(r8, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, '!C^:N'}, {0x20, '^'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '$:#},-'}], 0xa, "0e85c46b05a3a66ceb25df58e58897e35038ca1028c7397619ac6dd447b8ceac005b187f57c8b92e9268a3bca38294a94d76d662d80fe721bac925a7f3e00604d1"}, 0xbf) (async) accept4$nfc_llcp(r5, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80800) (async) dup2(r2, r4) 21:30:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454d4, 0x0) 21:30:04 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) (async) write$eventfd(r1, &(0x7f0000000340), 0x8) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(r2, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r5 = dup2(r3, r4) (async) write$eventfd(r4, &(0x7f0000000340), 0x8) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r6, r7) read$eventfd(r6, &(0x7f0000000300), 0x8) (async) r8 = syz_open_procfs$pagemap(0x0, &(0x7f00000001c0)) write$binfmt_script(r8, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, '!C^:N'}, {0x20, '^'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '$:#},-'}], 0xa, "0e85c46b05a3a66ceb25df58e58897e35038ca1028c7397619ac6dd447b8ceac005b187f57c8b92e9268a3bca38294a94d76d662d80fe721bac925a7f3e00604d1"}, 0xbf) accept4$nfc_llcp(r5, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80800) (async) dup2(r2, r4) 21:30:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454d8, 0x0) 21:30:04 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async, rerun: 64) fsmount(0xffffffffffffffff, 0x1, 0x80) (rerun: 64) [ 230.561149][ T7050] blktrace: Concurrent blktraces are not allowed on loop3 21:30:04 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1913c0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xfffffffe}) dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"}) 21:30:05 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:05 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1913c0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"}) (async) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xfffffffe}) dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"}) 21:30:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454d9, 0x0) 21:30:05 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x80) 21:30:05 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1913c0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xfffffffe}) dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"}) 21:30:05 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x3, 0x10040) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r3, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r5, r6) write$eventfd(r6, &(0x7f0000000340), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2d, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xc7b}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x672}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @printk={@d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x7f, 0x2, 0x3, 0x2, 0x6}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0x28, &(0x7f0000000280)=""/40, 0x40f00, 0x61, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x10, 0x1, 0x80000000}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000340)=[r1, r6], &(0x7f0000000380)=[{0x3, 0x5, 0x3, 0x7}, {0x4, 0x4, 0xf, 0xb}, {0x0, 0x3, 0xd, 0x3}, {0x1, 0x1, 0xa, 0xe}], 0x10, 0x2}, 0x90) 21:30:05 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:05 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) (async) r1 = dup2(0xffffffffffffffff, r0) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x3, 0x10040) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r3, r4) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r5, r6) (async) write$eventfd(r6, &(0x7f0000000340), 0x8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2d, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xc7b}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x672}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @printk={@d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x7f, 0x2, 0x3, 0x2, 0x6}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0x28, &(0x7f0000000280)=""/40, 0x40f00, 0x61, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x10, 0x1, 0x80000000}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000340)=[r1, r6], &(0x7f0000000380)=[{0x3, 0x5, 0x3, 0x7}, {0x4, 0x4, 0xf, 0xb}, {0x0, 0x3, 0xd, 0x3}, {0x1, 0x1, 0xa, 0xe}], 0x10, 0x2}, 0x90) 21:30:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r2, r3) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) [ 231.416796][ T7085] blktrace: Concurrent blktraces are not allowed on loop3 [ 231.475970][ T7096] blktrace: Concurrent blktraces are not allowed on loop3 21:30:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454da, 0x0) 21:30:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, 0x0) dup2(r0, r1) 21:30:06 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:06 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) (async) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x3, 0x10040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r3, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r5, r6) (async) dup2(r5, r6) write$eventfd(r6, &(0x7f0000000340), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2d, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xc7b}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x672}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @printk={@d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x7f, 0x2, 0x3, 0x2, 0x6}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0x28, &(0x7f0000000280)=""/40, 0x40f00, 0x61, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x10, 0x1, 0x80000000}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000340)=[r1, r6], &(0x7f0000000380)=[{0x3, 0x5, 0x3, 0x7}, {0x4, 0x4, 0xf, 0xb}, {0x0, 0x3, 0xd, 0x3}, {0x1, 0x1, 0xa, 0xe}], 0x10, 0x2}, 0x90) 21:30:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000}) (async, rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r2, r3) (async) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:30:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, 0x0) dup2(r0, r1) 21:30:06 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6, 0x0) dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x1f, 0xc, 0x7, 0xe8ee, 0xeb, 0x7, &(0x7f0000000080)="acf53ed4682f3943a9f4a4ca28f444198949304eec532b186edad6d2bc3b727ffe08b77f1a0ee783bd16996b6c4613b09f7c73ebff8a511582dd99e101558b050c3875e646e5edecf55af2319a2868415be7a779c5205267f90422c1314dabd5d15aee77e98651ba5ae37b28913773da73a9460412df8cf3c7cf7ac58e6f7719405a9e48be6c83d180bff0a5ede0e79e5ecf57b282d0c0ab6e07c66f91f4ebadc4d436e4c9b057484ee5d10e8a116b86166d0ccee26c19b2838099ea47a554411576e646f88bae779cc4c48a098a4f694632e3be905a90f8161431e41ba41e8dc622eafd8527e167171a27"}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 21:30:06 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454dc, 0x0) 21:30:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r2, r3) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) (async) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000}) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) dup2(r2, r3) (async) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080)) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async) [ 232.276119][ T7114] blktrace: Concurrent blktraces are not allowed on loop3 21:30:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, 0x0) dup2(r0, r1) [ 232.356297][ T7128] blktrace: Concurrent blktraces are not allowed on loop3 21:30:07 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(0x0, 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454de, 0x0) 21:30:07 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6, 0x0) dup2(0xffffffffffffffff, r0) (async) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x1f, 0xc, 0x7, 0xe8ee, 0xeb, 0x7, &(0x7f0000000080)="acf53ed4682f3943a9f4a4ca28f444198949304eec532b186edad6d2bc3b727ffe08b77f1a0ee783bd16996b6c4613b09f7c73ebff8a511582dd99e101558b050c3875e646e5edecf55af2319a2868415be7a779c5205267f90422c1314dabd5d15aee77e98651ba5ae37b28913773da73a9460412df8cf3c7cf7ac58e6f7719405a9e48be6c83d180bff0a5ede0e79e5ecf57b282d0c0ab6e07c66f91f4ebadc4d436e4c9b057484ee5d10e8a116b86166d0ccee26c19b2838099ea47a554411576e646f88bae779cc4c48a098a4f694632e3be905a90f8161431e41ba41e8dc622eafd8527e167171a27"}) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) (async) r3 = socket$rxrpc(0x21, 0x2, 0xa) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 21:30:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'gre0\x00', 0x400}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) 21:30:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x0, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:07 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(0x0, 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:07 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6, 0x0) dup2(0xffffffffffffffff, r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x1f, 0xc, 0x7, 0xe8ee, 0xeb, 0x7, &(0x7f0000000080)="acf53ed4682f3943a9f4a4ca28f444198949304eec532b186edad6d2bc3b727ffe08b77f1a0ee783bd16996b6c4613b09f7c73ebff8a511582dd99e101558b050c3875e646e5edecf55af2319a2868415be7a779c5205267f90422c1314dabd5d15aee77e98651ba5ae37b28913773da73a9460412df8cf3c7cf7ac58e6f7719405a9e48be6c83d180bff0a5ede0e79e5ecf57b282d0c0ab6e07c66f91f4ebadc4d436e4c9b057484ee5d10e8a116b86166d0ccee26c19b2838099ea47a554411576e646f88bae779cc4c48a098a4f694632e3be905a90f8161431e41ba41e8dc622eafd8527e167171a27"}) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 21:30:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x0, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454e2, 0x0) 21:30:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3}) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100)) dup2(0xffffffffffffffff, r1) 21:30:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'gre0\x00', 0x400}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) 21:30:07 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(0x0, 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x0, &(0x7f00000000c0)}) dup2(r0, r1) 21:30:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x40049409, 0x0) 21:30:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3}) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100)) dup2(0xffffffffffffffff, r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0) (async) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3}) (async) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100)) (async) dup2(0xffffffffffffffff, r1) (async) 21:30:08 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x40086602, 0x0) 21:30:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'gre0\x00', 0x400}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) 21:30:08 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3}) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100)) dup2(0xffffffffffffffff, r1) 21:30:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0}) dup2(r0, r1) 21:30:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x108) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "0f45595445ebd9744a786b3da55149333c2e2a61f72939ffdbd57bb992a7370bd650d51e9bb23ff4ea28614fe1b03615eb9115"}, 0x37) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:30:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:08 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r1, r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r3, r4) write$eventfd(r3, &(0x7f0000000340), 0x8) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000100)) dup2(0xffffffffffffffff, r0) 21:30:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0}) dup2(r0, r1) 21:30:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x40087602, 0x0) 21:30:09 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(0x0, 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0}) dup2(0xffffffffffffffff, r0) 21:30:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r1, r2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x7a05, 0x1700) (async) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r3, r4) (async) write$eventfd(r3, &(0x7f0000000340), 0x8) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000100)) (async) dup2(0xffffffffffffffff, r0) 21:30:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x108) (async) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "0f45595445ebd9744a786b3da55149333c2e2a61f72939ffdbd57bb992a7370bd650d51e9bb23ff4ea28614fe1b03615eb9115"}, 0x37) (async) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:30:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x401054d5, 0x0) [ 234.812018][ T27] kauditd_printk_skb: 580 callbacks suppressed [ 234.812031][ T27] audit: type=1326 audit(1702503009.132:11379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 234.842299][ T27] audit: type=1326 audit(1702503009.132:11380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 234.866391][ T27] audit: type=1326 audit(1702503009.132:11381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:30:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(0x0, 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(0x0, 0xc5) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r1, r2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r3, r4) (async) write$eventfd(r3, &(0x7f0000000340), 0x8) (async) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000100)) (async, rerun: 64) dup2(0xffffffffffffffff, r0) (rerun: 64) [ 234.890368][ T27] audit: type=1326 audit(1702503009.132:11382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 234.914551][ T27] audit: type=1326 audit(1702503009.132:11383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 234.938563][ T27] audit: type=1326 audit(1702503009.132:11384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:30:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, r0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r0}) [ 234.962731][ T27] audit: type=1326 audit(1702503009.132:11385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 234.986807][ T27] audit: type=1326 audit(1702503009.132:11386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 235.011096][ T27] audit: type=1326 audit(1702503009.132:11387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 [ 235.035180][ T27] audit: type=1326 audit(1702503009.132:11388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000 21:30:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, r0) (async) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r0}) [ 235.036585][ T7242] blktrace: Concurrent blktraces are not allowed on loop3 21:30:09 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0}) dup2(0xffffffffffffffff, r0) 21:30:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async, rerun: 32) ioctl$TUNSETLINK(r0, 0x400454cd, 0x108) (async, rerun: 32) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "0f45595445ebd9744a786b3da55149333c2e2a61f72939ffdbd57bb992a7370bd650d51e9bb23ff4ea28614fe1b03615eb9115"}, 0x37) (async) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:30:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) dup2(0xffffffffffffffff, r0) (async, rerun: 32) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r0}) (rerun: 32) 21:30:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x401054d6, 0x0) 21:30:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0}) dup2(0xffffffffffffffff, r0) 21:30:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x401c5820, 0x0) 21:30:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000001140)={0x3, 0x11, 0x2, 0x8, 0x1000, 0x5, &(0x7f0000000140)="753332a3714dbcb3598eaca2351cad491cfa8ffed8331f63a93da4ea4742eebc097922b579861e5fc77069151d5edc6791748840c149bd5ed80c87b99aa5d041e50990e5bb95ed39b3592158bdd840bfb72d682e51987ef568eb1f333a5fdadc5494e194120cf488f90ef485122b7efe53491da8aa9537a0ce0144a4b852f0b923570176f555dbea75269dea75f5d46ed220c8c85f80f766753dce851cd9705d4932715e885784b9b5a76a21379485e5ecce2639939a71ced275a948c05d78c54962bd2f1afc22836f413315267056224b134c4d7b794db9e728e13c58e83ef116890085a965dea77b1222d4f3eda9f88a13443703db3e09c1de742a863aeee7704e6c74a6c6e0bf47b067108c4ade95f0c40ad7b4e912b5f700dc6cc89842fc1e49fd42a42d11faa19b518069d4b7a7d393e3b8f32d5c7c346fdb9585eaeb34f301eb978aed04d7608236e4a1cd4ba57c4fb57b346b5cd4512bd184bcbed2ea47fc70ac7cd24faad9d08fa29139952b36d9eef7cf66a46ed8fe27d7e0c0c461f987d41291460459330e5e43d9952885ce5ee65e8290879096063199f1d4403c9dda23597b631eda58b9ee5a9bcd4da15cf6b3c475ca73e764732f028f822c408a0f01e10d0370013c1b88f21aaf3c5e5e613a915a8892ba450edcb443ee4cae1629979aff855e6fa615335da9081b100b095f4d59a55326851923445f37d898df66ffabb450a7c007ab22f7f3dd610dabd4c72ac2c1ea02975dc53cf9b6e5c93fc492fe5e73dfcbcb76b6de90aa3826659b290b080c4e3dd2b4ed59ca82254066d6a4ea900396412068beef4cc825215b9c3c5f53017bf414d87916de8372c0d8aef326c9f11eb662fece07a16908eee4d7fb48e09b36f8e87dbbd7e480f69ea5598f677eedc66cde42134435bd2756d682c8955b4fa5dd65bbc8f9e8aad60d8e5f44a2f36fca3be9b85eee723294f76a050974f1fa5986c678ec29ba75a9a2363e8bc6d169526df559f8412e0d80808aa7b7ac7644a33e0280bf41450b685fb660d730e7367207e0e2f951aa175c1ecfdef2f71bf7ebd3ad759b5037196564437d68e7a5de5e09cdef3b5bd8e51cc567059f9245251f7935b0f3e3556ba2aa706803e227e5445a44ca73ebad50d831dc8c120d77ac2cc6f4adb20fc6ce9b4eaf6621d271e6b4c94ff489e047737ab054aa0da7c6cf0c57209593452a3ab0966fc710e32533c0c3a57ce80561bc196384e386a70fdba615b63e6b969fe3652638e2199f76f196d89439fe24ab9c27c93188118295db6afadbbad7992e21f21b57c21953825f2605609ba069c7344f525d43db780d50441b67bb3d1aac441cdcf4dab2864741a43257561a7e634fa0e07b24365a2c76d82b6b1d30d901f36f7a085eb949f37b9ed74c61c398d66d9137bd9cbe5ac16fc6090e117ceb25ea53f9f9f2386d5a39d2438d9ccf361e85bbc25bf642deb219c5c37dfdf2cade0525a7d469e6ac96b6265b94bea30e9292c9010cabfa5e6ab99f8969207fb6d9f9ffee5b74261292d51cd3dc280b5c17e2dfa7580fb47b77c40d39e37339e8171f0c5a165456c2f86d8f1403438d86228b475b6a37f2d3a5103657206ab9e2bb4785592717e1e51aeea7728b6d1cfb41d809cbc261ed22abc42f688d8293c8a7d1dd8ea0d672a2862b1c8b6399a9236254424eb894216d54fe543bdddab27eed39f42801506aa5692b07a61935c2de84b53301b3ef2392217e3a8db0122dfffe59ed46390a8cb548f2e2b66d7f626697294945fcd0f3159898590393145aac42ad7b1f97023eb1ca8baab0c16dffee1dbae2bdff03662968b4c099bb7ac58aabc727f201e6bc13480587bb1c763f20d75e85b04f8c155cf139f429dc53ffe919fbf17f61e4dce295dcc17f6c627129cd3617cecd4d6b41097ea9ca49777842757d472324c0f7595ad5ceda291ece12ce34e5735fb5e69ce717e7c5c5f626e2f1c436b8c46d191ab8e96a7a2293556632947962e63a24599147b49c1f3e7de3cadc26b931e4335e08608e7e5d1662da3c22813138ae7d397193833d20f6ded35d12eab216c87847a015c2f9b8c6e0143a079d790b87f879801041bde584cc62c1eadb6be3cc8f9984b856cec7ae37d99b26231fce4b8d2190b2edbd70441991878945a10716237674bf9db99f337d21e091ffd863737a4c020ea7116cfe88ac323996d698b289ad6a0de717efd6f829d94ca8a3163741e9892030f2d84c4f411446d88d0e09d509d88f11408a9fecd656aa32af1c1f3f9d515be6cf90e84e9714212f11c006bbc67bdcc2376619ad97c7313fa319669fa97320984cd81ce9ac17f4dcb9dd46627d520e727b836905b874bbc54263bfcc84d45873d49aa2492f5f3183d4d60c4cb72fae1b90c42a9a94c6aa837ec8e560ab23169a71f197ff7afa487c98858e7075a700a78680ad7c015ea56e54e9099c1d57d66de36471a89c5bc060c590ed6c13682882cd2b02800d3acab59eccd1ee3b5eb321e4515a77deaa78b4c3f541ed144dad3d51571a687be5cad8fd3528837775c9fb7b9452b16b5bd5b90129cd18e47809b5c0472edd0c61653b49c6bb44ab2ca49a972a1dd5f682c793e1ada3ec89db6bd79e723ab2e66b5d8cd55d021e6ea13193a455e44c2e83d2cacab15bd10a29fc0ca73c90d66b51f6de2f14262f237b3b757eb12ca3595eef23408ad67ae7aefadbb5c2173dc10b9da42b46f3a353b646374ecf83521fb3663b27273fa1616195d7e0370ccc176577ff5121424e5635d87865073d6d10120ecda83fbf3fba81f2f0c390c0a9ceafdfbcdc4d6c2b588d8ec66c7da6906ec5945d33c203235507c2508f76bad7db30d42246ffb546fe5a1cc4a10ba8e64aea6084e6820030f79bec327ffbb434b3002caaec72737b5ea7d0ea5e4736edc58ecf7ceec6ae70238d38c3b3417466eb72f84ec589214799f4b9c69a4513909ef63dd11f165555c8648273614662f6701ca6e7612c3bc47d3bc92948e38ccc3a70b0fe94eb8179932d3eeb33d7d3062cc083ab2e3d2ca7d418d00e79a6c53c09a5e7cc77e19ed4993062536554aa557da607923a78cbbf0408dfedb40111585108e42ab3351cfc7be3c887c1eebb59a9cae616574766ddf2bd476568c885a3e0389588c057dc08c932f810de7eb5d4354151b1e70ede69b2da1a3ec9e0796dc0c28b989922b0e97d66000949d5835f052a8bd7c1f28f88f7ad7a96eb31c0e9370db3a9f8534b6d76ac76ad88cca53dacf46edf4dcce2ac530e355e2316fb2e2efb7cc42f7be2e9225f4e576a0bc4374c6bfc2465f762cbc7f9fa1b2725ea10c2acd2bddfb2f634afc17787f29dc521cb69abdb9df00590b37c8567c5bbbd40a1e9d069dca31a4f112a791a81624b07b10448ad34bc6ef8ef5d28b97f85883e61027984d4fc55111fddce9055a783d19d6fe0319333254a013ecaf97d8329a1d84439e840dd65549b70df7e5fefb4f8c3af94b988b5538a9dad776cdca63ae9dc7b94b0c8b3197006efcaefa2f89ff0f5d616c49de786008304a776c10b210e332465923bbd89c618adb6cf00e11d3b795e67b6df8dc604a0c39d4ed8cd28a2136b65b2fe0094f0e98c845acef7fdd74fae0c05ca3aa1a1a34e25dbb5c639b54fbbc1161f0d0c9d2d46fef9efe4bfc9de0db859129ba73a76b025bbd5119c33fde0c930e7691ab7d28a4a8992e1fdc54097ce19bd95f9f48fcc8619929a830f0b2ced925e9d20fd2ca0ae046279f07041ce93bddb501e79f6e214d761b850119681803773e22d92862720dcfbf4ec74b05a513f0df643ee06d9a469d6693822c8da40ff47e888eeae83b22c40df799abd7e2c9b157ba2e29064992861ebbbef6974ae28a5092fe7b8dc98ab44b0ac67a95f27c3edf55aed89d6fd43966734a896dca38ea63bbc2030e6570dca6c609eb43ab79f0b077d8dcef89a6ad1123a6f435d881aecfc8942e8684b5e3d9426d16cf982bdf964de87ae30f2ec23539bde0fe436cd5ca7436bd39b5f045a6a9a6ff7a16ca825fd76bf784784c8da6952808b69a6527cc28524a076ba6f915870a15d88b78a2376f112644d2035bb52cb34d2f440c76c08026fa1067a0fe538d730047a0b3b5f4149740b61fed21a5da81f6cbe92c339be3941d8453a7ee326f09c7d92a5e62ed5aef48c80424801e504af21831831f1032bf2b07d6096069b8a048b74b6ddf04c793c6b33eb77e7fd201b848ee8093e2fcbb30c097f1b8aadf36cf3b221e3e513021e44e0961731cdee0e6a23e4fcbf43067aca576752eb1a38d217760d36c1cc85bd5ffbe0d590f30d39e3ed23f77d715b18fdae76fa5a860bfe1ed71711d03f8626ef5fd52804787d034d01a94a7012d5e476782094e5c24490b426a9d3b4e3a8c76f7b11210f7b79cd935c33a866afc48e6c2e1785a9f7a4cbdef32086df42c725e83ec5933db9fb830dc33bb58bb767da9fe9a8ee2db92a1be2dffa0b020daaa5bec6e22fd51fee27ebc6912a486cde77ba0a5bedb7da26862c2517a55ee0f8aff2fe000f8f7f59ed7d46c38c4f498c807ed60ad429feab4546ef9cd5c6eaf8babf3696f33089ab95307906157b104aa5dc19384df0d86e61e9174cc4595da8c19621e1e1d3dbbf89ee74e994c512a6884664bd910b1d429f68bb62f1f203310c546ec13dbb243c00ad5876551f49ba3341112820b50a8ecbb7108838721f53ec7d97d6d8e615757472cd00bc1aff263e03870a19d8b1e0276375c4973fcb005ebb73bcb6fb196bda6c58b5500f7004d9adc789db8d701a2e084afc3fafe33c93860699e898e367e729670d0c826885af8d339c0227638b677c8f80351a6a3e150b91d5cb42c8973a0019ad57b245787e401dca3c9a6f8ee5c8586eb628be2b56bf3ed23557095bb2efd3779368e4059926ac6e91680020b77635d1e603415bf1ce9f0cc627f5337e3a87b608dec95a99c039457c2c08baaf103cb46656c5845507dbec53aa98f7db1f7cdb8682929f8106d0a0c407c3783c1c935b17697407320889acbf7710cd632281ec54f51df5e18ab504c7d94628c874633666a2988526672c89101ed625125a9f19c7673dd360f6fcb26185d982692693b0e6d01d1e6a1f999f3be6c7bf4a4b477184da4645cab622c6a7d034ec83517a8f761c942d63d48e9c19cf9aa9fe1b2b427ab00bfb3a42fd00f36ea3e186bf4078dd4b098f740f635ca17ba567d86926daf148ef4eb48d2c25bb8e86584c61a9ed613a5a0de8fa523edab8143d2242fc00d566ed4d9785d6c47b2dfbd53aa50f5956d62f09edd7eb40ab4b63832d7ab1eb5d9d6a1cfada768e397f5210155e3492b916886f1860a2691a9c1a30a575a167fcd2353d3e5f63c9a32dd11f240037213a667b42917f07e02f4361b1f683e020ab61f6f58508135ed6be23551452be56b33fedd8b51721a8355184dc58417b78b277ec3e623f9f7979e88c370e2aa66372250fff6a82d7dd863d446370de0f2776f876a565cfdd2aab5929662805ae3964870c539938786082cc0c3599dbc7cfaec0d7c86e75fdae52235d66600ea463b49a04f878d118d5e708e4185353bffc92dd724892fb197c34535bccca4d2ebd19bc484e09274ae221d5f960c5a516f9fcd23f33bbaf832dcc4ad242466d3f3bb0b8a280d49e1ebf5c5f95e2fea1b21cdbbe5bdf972174ee670fd6cb00bdfbe706c7dc7f288cb042d001178c102f0b8b45fe8f06af352bdf048a2b00f8fde45790bbfd8cfc7d329820ad89830ef777cb8a1e"}) dup2(0xffffffffffffffff, r1) r3 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x204000) getsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xfffffe13) 21:30:10 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x646f3efc05203221, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r2, r3) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r1, r4) r5 = getgid() syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r5, @ANYRES16=r5], 0x0, 0x4f5, &(0x7f0000000540)="$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") r6 = getgid() [ 235.706436][ T7261] blktrace: Concurrent blktraces are not allowed on loop3 syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r6, @ANYRES16=r6], 0x1, 0x4f4, &(0x7f0000000540)="$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") r7 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYRES16=r7], 0x1, 0x4f4, &(0x7f0000000540)="$eJzs3U9vG2kZAPBnnHhJt1mSZTksK+2yYhelK6idbNg24tAWCXGrBCr3EiVOFMWJo9hpm6hCqfgASAhBJU6cuCDxAZBQPwKqVIneESAQghYOHIBBM56ExLKbVBvblfP7Sa/nnbFnnue14/H8eTMTwLn1fkTciIixiPgoIqaK6aWixH67ZK97/uz+UlaSSNNbf0siKaZF5NVDF4vZJtqDrpq7e+uL9Xptuxivtja2qs3dvctrG4urtdXa5vz83JWFqwufLMyeSTuzdl375p9+8sNffOvab7569/e3/3Lp+1nSk8XzRTvO3NP8sZy9F4fGI2K7H8GGYKxoT0wPOxMAAE7jrYj4XER8Kd/+n4qx9tZc5ButAAAAwEhIr0/Gv5OIFAAAABhZ1/M+sEmpUvT3nYxSqVJp9+H9fLxeqjeara+sNHY2l9t9ZaejXFpZq9dmiz6101FOsvG5ogvowfjHHePzEfFmRPx46kI+Xllq1JeHffADAAAAzomLHfv//5xq7/8DAAAAI8a1mwAAAGD09dr/TwacBwAAANA/zv8DAADASPv2zZtZSQ/uf718Z3dnvXHn8nKtuV7Z2FmqLDW2tyqrjcZqfs2+jZOWV280tr4Wmzv3qq1as1Vt7u7d3mjsbLZurx27BTYAAAAwQG9+8dHTJCL2v34hL5nXsoexHjPoKwAjo/QyL/5j//IABq/Xzzww+saHnQAwPPvDTgAYtmOX+uiyUXC0886xYwa/7V9OAADA2Zr5Qvfz/9kuQHnYyQF99VLn/4GR4vw/nF8vef7/cb/yAAavbAsAzr2TbvXR8+Idpz7/n6YnLgsAAOirybwkpUpxLnAySqVKJeKN/F/9y8nKWr02GxGfjYjfTZU/k43P5XMmbg8IAAAAAAAAAAAAAAAAAAAAAAAAAKeUpkmkAAAAwEiLKP05Ke7/NTP14WTn8YHXkn9N5cOIuPuzWz+9t9hqbc9l0/9+OL31sJj+8TCOYAAAAACdDvbTD/bjAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAsPX92f+mgDDLuX78REdPd4o/HRD6ciHJEvP6PJMaPzJdExNgZxN9/EBFvd4ufZGnFdJFFZ/xSRFwYTPx30zTtGv/iGcSH8+xRtv650e37V4r382H37/94UT6t3uu/0uH6b6zH+u+NU8Z458mvqj3jP4h4Z7z7+ucgftIj/gfdFtjlTfned/f2esVPfx4x0/X3JzkWq9ra2Ko2d/cur20srtZWa5vz83NXFq4ufLIwW11Zq9eKx64xfvTur//bMek/aVve/ugRf/qE9n+YVcpHG9MZpgj25N6zt9rVcsci8viXPuj++b/9gvjZ38SXi9+B7PmZg/p+u37Ue798/F7XxIr4yz3af9Lnf6nXQjt89J0f/OGULwUABqC5u7e+WK/XtvteeZim6aBiqbyClYlXIw2VkytncWQLAAB41fx/o3/YmQAAAAAAAAAAAAAAAAAAAMD51dyNUr8vJ9YZc384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeKH/BQAA//+xGONE") r8 = memfd_secret(0x80000) ioctl$TUNSETGROUP(r8, 0x400454ce, r7) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:30:10 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 235.789265][ T7272] loop4: detected capacity change from 0 to 512 [ 235.802997][ T7272] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 235.812119][ T7272] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 235.821024][ T7272] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended [ 235.830579][ T7272] EXT4-fs error (device loop4): ext4_orphan_get:1394: inode #15: comm syz-executor.4: iget: bad extended attribute block 19 [ 235.843638][ T7272] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 235.856025][ T7272] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 235.940923][ T3132] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:30:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2b, 0x801, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) truncate(&(0x7f0000001700)='./file0\x00', 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5) open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4) inotify_init1(0x0) syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0}) dup2(r0, 0xffffffffffffffff) 21:30:10 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x4020940d, 0x0) 21:30:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0) (async) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) (async) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) (async) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000001140)={0x3, 0x11, 0x2, 0x8, 0x1000, 0x5, &(0x7f0000000140)="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"}) dup2(0xffffffffffffffff, r1) r3 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x204000) getsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xfffffe13) 21:30:10 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 21:30:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x646f3efc05203221, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 32) dup2(r2, r3) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r1, r4) r5 = getgid() syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r5, @ANYRES16=r5], 0x0, 0x4f5, &(0x7f0000000540)="$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") (async, rerun: 64) r6 = getgid() (rerun: 64) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r6, @ANYRES16=r6], 0x1, 0x4f4, &(0x7f0000000540)="$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") (async, rerun: 64) r7 = getgid() (rerun: 64) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYRES16=r7], 0x1, 0x4f4, &(0x7f0000000540)="$eJzs3U9vG2kZAPBnnHhJt1mSZTksK+2yYhelK6idbNg24tAWCXGrBCr3EiVOFMWJo9hpm6hCqfgASAhBJU6cuCDxAZBQPwKqVIneESAQghYOHIBBM56ExLKbVBvblfP7Sa/nnbFnnue14/H8eTMTwLn1fkTciIixiPgoIqaK6aWixH67ZK97/uz+UlaSSNNbf0siKaZF5NVDF4vZJtqDrpq7e+uL9Xptuxivtja2qs3dvctrG4urtdXa5vz83JWFqwufLMyeSTuzdl375p9+8sNffOvab7569/e3/3Lp+1nSk8XzRTvO3NP8sZy9F4fGI2K7H8GGYKxoT0wPOxMAAE7jrYj4XER8Kd/+n4qx9tZc5ButAAAAwEhIr0/Gv5OIFAAAABhZ1/M+sEmpUvT3nYxSqVJp9+H9fLxeqjeara+sNHY2l9t9ZaejXFpZq9dmiz6101FOsvG5ogvowfjHHePzEfFmRPx46kI+Xllq1JeHffADAAAAzomLHfv//5xq7/8DAAAAI8a1mwAAAGD09dr/TwacBwAAANA/zv8DAADASPv2zZtZSQ/uf718Z3dnvXHn8nKtuV7Z2FmqLDW2tyqrjcZqfs2+jZOWV280tr4Wmzv3qq1as1Vt7u7d3mjsbLZurx27BTYAAAAwQG9+8dHTJCL2v34hL5nXsoexHjPoKwAjo/QyL/5j//IABq/Xzzww+saHnQAwPPvDTgAYtmOX+uiyUXC0886xYwa/7V9OAADA2Zr5Qvfz/9kuQHnYyQF99VLn/4GR4vw/nF8vef7/cb/yAAavbAsAzr2TbvXR8+Idpz7/n6YnLgsAAOirybwkpUpxLnAySqVKJeKN/F/9y8nKWr02GxGfjYjfTZU/k43P5XMmbg8IAAAAAAAAAAAAAAAAAAAAAAAAAKeUpkmkAAAAwEiLKP05Ke7/NTP14WTn8YHXkn9N5cOIuPuzWz+9t9hqbc9l0/9+OL31sJj+8TCOYAAAAACdDvbTD/bjAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAsPX92f+mgDDLuX78REdPd4o/HRD6ciHJEvP6PJMaPzJdExNgZxN9/EBFvd4ufZGnFdJFFZ/xSRFwYTPx30zTtGv/iGcSH8+xRtv650e37V4r382H37/94UT6t3uu/0uH6b6zH+u+NU8Z458mvqj3jP4h4Z7z7+ucgftIj/gfdFtjlTfned/f2esVPfx4x0/X3JzkWq9ra2Ko2d/cur20srtZWa5vz83NXFq4ufLIwW11Zq9eKx64xfvTur//bMek/aVve/ugRf/qE9n+YVcpHG9MZpgj25N6zt9rVcsci8viXPuj++b/9gvjZ38SXi9+B7PmZg/p+u37Ue798/F7XxIr4yz3af9Lnf6nXQjt89J0f/OGULwUABqC5u7e+WK/XtvteeZim6aBiqbyClYlXIw2VkytncWQLAAB41fx/o3/YmQAAAAAAAAAAAAAAAAAAAMD51dyNUr8vJ9YZc384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeKH/BQAA//+xGONE") (async) r8 = memfd_secret(0x80000) ioctl$TUNSETGROUP(r8, 0x400454ce, r7) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 21:30:10 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) 21:30:10 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801) r2 = dup2(r0, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4}) [ 236.516036][ T7277] ==================================================================