00000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  177.965047][   T26] EXT4-fs (loop1): i_reserved_data_blocks=17
21:29:12 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(0xffffffffffffffff, r2, 0x0, 0x80040)

21:29:12 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x401054d5, 0x0)

[  178.066426][ T5208] loop5: detected capacity change from 0 to 2048
[  178.104925][   T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
[  178.121688][   T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  178.134154][   T52] EXT4-fs (loop5): This should not happen!! Data will be lost
[  178.134154][   T52] 
[  178.143835][   T52] EXT4-fs (loop5): Total free blocks count 0
[  178.149825][   T52] EXT4-fs (loop5): Free/Dirty block details
[  178.155753][   T52] EXT4-fs (loop5): free_blocks=0
[  178.160683][   T52] EXT4-fs (loop5): dirty_blocks=16
[  178.165810][   T52] EXT4-fs (loop5): Block reservation details
[  178.171791][   T52] EXT4-fs (loop5): i_reserved_data_blocks=1
[  178.179220][   T52] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
[  178.194160][   T52] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 257 with error 28
[  178.206613][   T52] EXT4-fs (loop0): This should not happen!! Data will be lost
[  178.206613][   T52] 
[  178.216347][   T52] EXT4-fs (loop0): Total free blocks count 0
[  178.222387][   T52] EXT4-fs (loop0): Free/Dirty block details
[  178.228449][   T52] EXT4-fs (loop0): free_blocks=0
[  178.233379][   T52] EXT4-fs (loop0): dirty_blocks=272
[  178.238667][   T52] EXT4-fs (loop0): Block reservation details
[  178.244647][   T52] EXT4-fs (loop0): i_reserved_data_blocks=17
21:29:12 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:12 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r2)

21:29:12 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:12 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x401054d6, 0x0)

21:29:12 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(0xffffffffffffffff, r2, 0x0, 0x80040)

21:29:12 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:12 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x401c5820, 0x0)

21:29:12 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(0xffffffffffffffff, r2, 0x0, 0x80040)

[  178.406714][ T5223] loop5: detected capacity change from 0 to 2048
21:29:12 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:12 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r2)

21:29:12 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  178.449054][   T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
[  178.485322][   T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117
21:29:12 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
dup2(r0, r2)

[  178.497690][   T52] EXT4-fs (loop5): This should not happen!! Data will be lost
[  178.497690][   T52] 
[  178.543872][ T5238] loop5: detected capacity change from 0 to 2048
[  178.574285][   T26] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set
[  178.589096][   T26] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117
[  178.601441][   T26] EXT4-fs (loop5): This should not happen!! Data will be lost
[  178.601441][   T26] 
21:29:13 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x4020940d, 0x0)

21:29:13 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:13 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
dup2(r0, r2)

21:29:13 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:13 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:13 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040)

21:29:13 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040)

[  179.259887][ T5251] loop5: detected capacity change from 0 to 2048
[  179.282695][   T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
21:29:13 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:13 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:13 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:13 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454cf, 0x0)

21:29:13 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
dup2(r0, r2)

[  179.298228][   T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  179.310457][   T52] EXT4-fs (loop5): This should not happen!! Data will be lost
[  179.310457][   T52] 
[  179.320113][   T52] EXT4-fs (loop5): Total free blocks count 0
[  179.326173][   T52] EXT4-fs (loop5): Free/Dirty block details
[  179.332211][   T52] EXT4-fs (loop5): free_blocks=0
[  179.337255][   T52] EXT4-fs (loop5): dirty_blocks=16
[  179.342361][   T52] EXT4-fs (loop5): Block reservation details
[  179.348398][   T52] EXT4-fs (loop5): i_reserved_data_blocks=1
21:29:13 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
dup2(r0, r2)

21:29:13 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, 0xffffffffffffffff)

21:29:13 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040)

[  179.394978][ T5266] loop5: detected capacity change from 0 to 2048
[  179.436808][   T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
[  179.461287][   T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117
[  179.473630][   T52] EXT4-fs (loop5): This should not happen!! Data will be lost
[  179.473630][   T52] 
[  179.501575][ T5278] loop5: detected capacity change from 0 to 2048
[  179.522708][ T3227] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:6: bg 0: block 234: padding at end of block bitmap is not set
[  179.537452][ T3227] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  179.554535][ T3227] EXT4-fs (loop5): This should not happen!! Data will be lost
[  179.554535][ T3227] 
[  179.564201][ T3227] EXT4-fs (loop5): Total free blocks count 0
[  179.570297][ T3227] EXT4-fs (loop5): Free/Dirty block details
[  179.576214][ T3227] EXT4-fs (loop5): free_blocks=0
[  179.581149][ T3227] EXT4-fs (loop5): dirty_blocks=16
[  179.586325][ T3227] EXT4-fs (loop5): Block reservation details
[  179.592384][ T3227] EXT4-fs (loop5): i_reserved_data_blocks=1
21:29:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:14 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, 0xffffffffffffffff)

21:29:14 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454d2, 0x0)

21:29:14 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
dup2(r0, r1)

21:29:14 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:14 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x0)

21:29:14 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, 0xffffffffffffffff)

21:29:14 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:14 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454d3, 0x0)

21:29:14 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
dup2(r0, r1)

21:29:14 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, 0xffffffffffffffff)

21:29:14 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  180.125428][ T5289] loop5: detected capacity change from 0 to 2048
[  180.147245][ T5289] EXT4-fs mount: 378 callbacks suppressed
[  180.147257][ T5289] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  180.213774][ T3227] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:6: bg 0: block 234: padding at end of block bitmap is not set
[  180.229341][ T3227] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117
[  180.241677][ T3227] EXT4-fs (loop5): This should not happen!! Data will be lost
[  180.241677][ T3227] 
[  180.252199][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:15 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:15 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x0)

21:29:15 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454d7, 0x0)

21:29:15 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:15 executing program 0:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x0)

21:29:15 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
dup2(r0, r1)

21:29:15 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

[  180.989826][ T5315] loop0: detected capacity change from 0 to 2048
[  180.993132][ T5319] loop5: detected capacity change from 0 to 2048
[  181.007466][ T5315] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  181.007466][ T5319] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:29:15 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:15 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454dd, 0x0)

21:29:15 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x0)

[  181.053599][   T52] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
[  181.072481][   T52] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  181.084782][   T52] EXT4-fs (loop0): This should not happen!! Data will be lost
[  181.084782][   T52] 
[  181.094438][   T52] EXT4-fs (loop0): Total free blocks count 0
21:29:15 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  181.100574][   T52] EXT4-fs (loop0): Free/Dirty block details
[  181.106480][   T52] EXT4-fs (loop0): free_blocks=0
[  181.111422][   T52] EXT4-fs (loop0): dirty_blocks=16
[  181.116544][   T52] EXT4-fs (loop0): Block reservation details
[  181.122545][   T52] EXT4-fs (loop0): i_reserved_data_blocks=1
[  181.132994][   T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
21:29:15 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

[  181.152653][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  181.162990][   T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  181.175275][   T52] EXT4-fs (loop5): This should not happen!! Data will be lost
[  181.175275][   T52] 
[  181.184958][   T52] EXT4-fs (loop5): Total free blocks count 0
[  181.190998][   T52] EXT4-fs (loop5): Free/Dirty block details
[  181.196946][   T52] EXT4-fs (loop5): free_blocks=0
[  181.201881][   T52] EXT4-fs (loop5): dirty_blocks=16
[  181.207018][   T52] EXT4-fs (loop5): Block reservation details
[  181.213012][   T52] EXT4-fs (loop5): i_reserved_data_blocks=1
[  181.220073][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  181.259724][ T5338] loop5: detected capacity change from 0 to 2048
[  181.286764][ T5338] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  181.307328][  T455] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:5: bg 0: block 234: padding at end of block bitmap is not set
[  181.322072][  T455] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  181.334348][  T455] EXT4-fs (loop5): This should not happen!! Data will be lost
[  181.334348][  T455] 
[  181.344036][  T455] EXT4-fs (loop5): Total free blocks count 0
[  181.350473][  T455] EXT4-fs (loop5): Free/Dirty block details
[  181.356383][  T455] EXT4-fs (loop5): free_blocks=0
[  181.361324][  T455] EXT4-fs (loop5): dirty_blocks=16
[  181.366497][  T455] EXT4-fs (loop5): Block reservation details
[  181.372484][  T455] EXT4-fs (loop5): i_reserved_data_blocks=1
[  181.380126][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:16 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

21:29:16 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:16 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:16 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x0)

21:29:16 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(0xffffffffffffffff)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0)

21:29:16 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:16 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

[  181.841611][ T5344] loop5: detected capacity change from 0 to 2048
[  181.866868][ T5344] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  181.894491][  T455] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:5: bg 0: block 234: padding at end of block bitmap is not set
[  181.911391][  T455] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  181.923630][  T455] EXT4-fs (loop5): This should not happen!! Data will be lost
[  181.923630][  T455] 
[  181.933397][  T455] EXT4-fs (loop5): Total free blocks count 0
[  181.939422][  T455] EXT4-fs (loop5): Free/Dirty block details
[  181.945343][  T455] EXT4-fs (loop5): free_blocks=0
[  181.950326][  T455] EXT4-fs (loop5): dirty_blocks=16
[  181.955460][  T455] EXT4-fs (loop5): Block reservation details
[  181.961498][  T455] EXT4-fs (loop5): i_reserved_data_blocks=1
[  181.968835][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:16 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454e0, 0x0)

21:29:16 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:16 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

21:29:16 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:16 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454e1, 0x0)

21:29:16 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, 0xffffffffffffffff)

21:29:16 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:16 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:16 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, 0xffffffffffffffff)

21:29:17 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x80086601, 0x0)

21:29:17 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, 0xffffffffffffffff)

[  182.688874][   T27] kauditd_printk_skb: 1514 callbacks suppressed
[  182.688884][   T27] audit: type=1326 audit(1702502957.012:3108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.719851][   T27] audit: type=1326 audit(1702502957.012:3109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.743890][   T27] audit: type=1326 audit(1702502957.012:3110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.767732][   T27] audit: type=1326 audit(1702502957.012:3111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.791731][   T27] audit: type=1326 audit(1702502957.012:3112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.815683][   T27] audit: type=1326 audit(1702502957.012:3113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:17 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x80040)

21:29:17 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:17 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(0xffffffffffffffff)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0)

21:29:17 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:17 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

[  182.839664][   T27] audit: type=1326 audit(1702502957.012:3114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.863696][   T27] audit: type=1326 audit(1702502957.012:3115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.871539][ T5388] loop5: detected capacity change from 0 to 2048
[  182.887641][   T27] audit: type=1326 audit(1702502957.012:3116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:17 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x80087601, 0x0)

21:29:17 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:17 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:17 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(0xffffffffffffffff, r0)

[  182.918064][   T27] audit: type=1326 audit(1702502957.012:3117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  182.951835][ T5388] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:29:17 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:17 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

[  183.004704][   T26] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set
[  183.025128][   T26] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  183.037495][   T26] EXT4-fs (loop5): This should not happen!! Data will be lost
[  183.037495][   T26] 
[  183.047275][   T26] EXT4-fs (loop5): Total free blocks count 0
21:29:17 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x801054db, 0x0)

21:29:17 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:17 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(0xffffffffffffffff, r0)

[  183.053378][   T26] EXT4-fs (loop5): Free/Dirty block details
[  183.059352][   T26] EXT4-fs (loop5): free_blocks=0
[  183.064286][   T26] EXT4-fs (loop5): dirty_blocks=16
[  183.069460][   T26] EXT4-fs (loop5): Block reservation details
[  183.075461][   T26] EXT4-fs (loop5): i_reserved_data_blocks=1
[  183.086296][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:18 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(0xffffffffffffffff, r0)

21:29:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:18 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:18 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x801c581f, 0x0)

21:29:18 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(0xffffffffffffffff, r0)

21:29:18 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(0xffffffffffffffff)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0)

21:29:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:18 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0)

21:29:18 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0)

21:29:18 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:18 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:18 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0xc0045878, 0x0)

21:29:18 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:18 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0)

21:29:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:18 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0)

21:29:18 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:18 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:18 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:18 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0xc0045878, 0x0)

21:29:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0xc0189436, 0x0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:19 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:19 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 2:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0xc020660b, 0x0)

21:29:19 executing program 2:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0)

21:29:19 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:19 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:19 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 2:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8001, 0x0)

21:29:19 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(0xffffffffffffffff, r0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:29:19 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:19 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(0xffffffffffffffff, r0)

21:29:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0)

21:29:20 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:20 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3)

21:29:20 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(0xffffffffffffffff, r0)

21:29:20 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:20 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0)

21:29:20 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:20 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x4)

21:29:20 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:20 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
socket(0x10, 0x3, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r3)

21:29:20 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0)

21:29:20 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:20 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:20 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x6)

21:29:20 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
socket(0x10, 0x3, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r3)

21:29:20 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x800454df, 0x0)

21:29:20 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
socket(0x10, 0x3, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r3)

21:29:20 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:21 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:21 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:21 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x7)

21:29:21 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:21 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:21 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
socket(0x10, 0x3, 0x0)
dup2(r0, r3)

21:29:21 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xb)

21:29:21 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:21 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:21 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:21 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r3)

21:29:21 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x24)

21:29:22 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x0, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:22 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
dup2(r0, r3)

21:29:22 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:22 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:22 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:22 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x60)

[  188.115696][   T27] kauditd_printk_skb: 1440 callbacks suppressed
[  188.115707][   T27] audit: type=1326 audit(1702502962.432:4559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  188.146069][   T27] audit: type=1326 audit(1702502962.432:4560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  188.170079][   T27] audit: type=1326 audit(1702502962.432:4558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  188.194103][   T27] audit: type=1326 audit(1702502962.432:4561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  188.218019][   T27] audit: type=1326 audit(1702502962.432:4562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  188.241897][   T27] audit: type=1326 audit(1702502962.432:4563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  188.265837][   T27] audit: type=1326 audit(1702502962.432:4564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  188.289871][   T27] audit: type=1326 audit(1702502962.432:4565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:22 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:22 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
dup2(r0, r3)

21:29:22 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  188.313934][   T27] audit: type=1326 audit(1702502962.432:4566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  188.337790][   T27] audit: type=1326 audit(1702502962.432:4567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
21:29:22 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x103)

21:29:22 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:22 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e)

21:29:23 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x0, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:23 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:23 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:23 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
dup2(r0, r3)

21:29:23 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:23 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x118)

21:29:23 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:23 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:23 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r2)

21:29:23 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x1ee)

21:29:23 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:23 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x300)

21:29:24 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r2)

21:29:24 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:24 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x301)

21:29:24 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x0, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:24 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x300)

21:29:24 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:24 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:24 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:24 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r2)

21:29:24 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x305)

21:29:24 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:24 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:24 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:24 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:24 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:25 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x0, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:25 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:25 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x306)

21:29:25 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r2)

21:29:25 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:25 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:25 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r2)

21:29:25 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:25 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:25 executing program 3:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:25 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x308)

21:29:25 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:25 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x0, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:25 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:25 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:25 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:25 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:25 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30c)

21:29:25 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:25 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:25 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x801, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:25 executing program 3:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:25 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x324)

21:29:26 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:26 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x0, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:26 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:26 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, 0xffffffffffffffff)

21:29:26 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x325)

21:29:26 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:26 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, 0xffffffffffffffff)

21:29:26 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, 0xffffffffffffffff)

21:29:26 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:26 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:26 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x335)

21:29:26 executing program 3:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:26 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:27 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:27 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:27 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x336)

21:29:27 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:27 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

[  193.259266][   T27] kauditd_printk_skb: 1309 callbacks suppressed
[  193.259277][   T27] audit: type=1326 audit(1702502967.582:5877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
21:29:27 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

[  193.289974][   T27] audit: type=1326 audit(1702502967.582:5878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  193.313892][   T27] audit: type=1326 audit(1702502967.582:5879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  193.337747][   T27] audit: type=1326 audit(1702502967.582:5880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  193.361974][   T27] audit: type=1326 audit(1702502967.582:5881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  193.385902][   T27] audit: type=1326 audit(1702502967.582:5882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
21:29:27 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

[  193.409902][   T27] audit: type=1326 audit(1702502967.582:5883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  193.433816][   T27] audit: type=1326 audit(1702502967.582:5884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
21:29:27 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:27 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:27 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

[  193.457949][   T27] audit: type=1326 audit(1702502967.582:5885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
[  193.481977][   T27] audit: type=1326 audit(1702502967.582:5886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f03d5f38ba9 code=0x7ffc0000
21:29:27 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x337)

21:29:27 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:27 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(0xffffffffffffffff, r0)

21:29:27 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:27 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:28 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(0xffffffffffffffff, r0)

21:29:28 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:28 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:28 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:28 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:28 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x339)

21:29:28 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a)

21:29:28 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:28 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(0xffffffffffffffff, r0)

21:29:28 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a)

21:29:28 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a)

21:29:28 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:28 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x503)

21:29:28 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:28 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(0x0, 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:29 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:29 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:29 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:29 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:29 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x600)

21:29:29 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(0x0, 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:29 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:29 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:29 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:29 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:29 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:29 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(0x0, 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:30 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, 0x0, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:30 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x603)

21:29:30 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:30 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:30 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0)
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:30 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:30 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:30 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:30 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:30 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:30 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:30 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x700)

21:29:30 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:30 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, 0x0, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:30 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a)

21:29:30 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:31 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a)

21:29:31 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x803)

21:29:31 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:31 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0)
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:31 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:31 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xa03)

21:29:31 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(0x0, 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:31 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a)

21:29:31 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:31 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xb00)

21:29:31 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(0x0, 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:31 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:29:31 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, 0x0, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:31 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:32 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0)
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:32 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(0x0, 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:32 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:32 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:29:32 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xc03)

21:29:32 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xe01)

21:29:32 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:29:32 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:32 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:32 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:32 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:32 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

[  198.373018][   T27] kauditd_printk_skb: 374 callbacks suppressed
[  198.373030][   T27] audit: type=1326 audit(1702502972.692:6261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  198.403398][   T27] audit: type=1326 audit(1702502972.712:6262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  198.427316][   T27] audit: type=1326 audit(1702502972.712:6263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  198.451403][   T27] audit: type=1326 audit(1702502972.712:6264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  198.475334][   T27] audit: type=1326 audit(1702502972.712:6265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  198.499338][   T27] audit: type=1326 audit(1702502972.712:6266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f63dbe927a0 code=0x7ffc0000
[  198.523387][   T27] audit: type=1326 audit(1702502972.752:6267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  198.547322][   T27] audit: type=1326 audit(1702502972.752:6268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
21:29:32 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:32 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:32 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:32 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x1801)

21:29:32 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xb00)

[  198.571383][   T27] audit: type=1326 audit(1702502972.752:6269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  198.595329][   T27] audit: type=1326 audit(1702502972.752:6270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
21:29:33 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:33 executing program 5:
r0 = creat(0x0, 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:33 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:33 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:33 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:33 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000)

21:29:33 executing program 5:
r0 = creat(0x0, 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:33 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:33 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:33 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:33 executing program 0:
r0 = creat(0x0, 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:33 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2400)

21:29:33 executing program 5:
r0 = creat(0x0, 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:33 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:33 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:33 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:33 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2403)

21:29:33 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:33 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:34 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:34 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:34 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:34 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:34 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2503)

21:29:34 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:34 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:34 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3503)

21:29:34 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:34 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:34 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:34 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:35 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:35 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:35 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3603)

21:29:35 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:35 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
dup2(r0, r1)

21:29:35 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:35 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:35 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:35 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:35 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x700)

21:29:35 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:35 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3703)

21:29:36 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:36 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3903)

21:29:36 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:36 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:36 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:36 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:36 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:36 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:36 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:36 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x6000)

21:29:36 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
dup2(r0, 0xffffffffffffffff)

21:29:36 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:36 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xee01)

21:29:36 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x20000)

21:29:36 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
dup2(r0, 0xffffffffffffffff)

21:29:36 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:37 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:37 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:37 executing program 1:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
dup2(r0, 0xffffffffffffffff)

21:29:37 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30000)

21:29:37 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:37 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:37 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(0xffffffffffffffff, r0)

21:29:37 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xb0000)

21:29:37 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, 0x0}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:37 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a)

21:29:37 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

21:29:37 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x1000000)

21:29:38 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:38 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, 0x0}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:38 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x1030000)

21:29:38 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
dup2(r0, r1)

21:29:38 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
socket(0x10, 0x3, 0x0)
dup2(r0, r3)

21:29:38 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, 0x0, &(0x7f0000000200))
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

[  203.763763][   T27] kauditd_printk_skb: 102 callbacks suppressed
[  203.763772][   T27] audit: type=1326 audit(1702502978.082:6373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fc1c3b5dba9 code=0x0
21:29:38 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, 0x0}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

[  203.802196][   T27] audit: type=1326 audit(1702502978.122:6374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  203.826229][   T27] audit: type=1326 audit(1702502978.122:6375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:38 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})

21:29:38 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
dup2(r0, r1)

[  203.854811][   T27] audit: type=1326 audit(1702502978.122:6376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  203.878800][   T27] audit: type=1326 audit(1702502978.122:6377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  203.902795][   T27] audit: type=1326 audit(1702502978.122:6378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  203.926858][   T27] audit: type=1326 audit(1702502978.122:6379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:38 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
dup2(r0, r1)

21:29:38 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})

[  203.950854][   T27] audit: type=1326 audit(1702502978.122:6380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  203.974832][   T27] audit: type=1326 audit(1702502978.122:6381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:38 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454d0, 0x0)

[  203.998908][   T27] audit: type=1326 audit(1702502978.122:6382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:38 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:38 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x1ee0000)

21:29:38 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(r0, r1)

21:29:38 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})

21:29:38 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r3)

21:29:38 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, 0x0, &(0x7f0000000200))
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:39 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

21:29:39 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(r0, r1)

21:29:39 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000000)

21:29:39 executing program 1:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
getpgid(0xffffffffffffffff)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(0xffffffffffffffff, r2, 0x0, 0x80040)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118)

21:29:39 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

21:29:39 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x4000000)

[  204.724228][ T6171] loop1: detected capacity change from 0 to 2048
[  204.739686][ T6171] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  204.766385][   T26] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set
[  204.781530][   T26] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  204.793752][   T26] EXT4-fs (loop1): This should not happen!! Data will be lost
[  204.793752][   T26] 
[  204.803410][   T26] EXT4-fs (loop1): Total free blocks count 0
[  204.809425][   T26] EXT4-fs (loop1): Free/Dirty block details
[  204.815307][   T26] EXT4-fs (loop1): free_blocks=0
[  204.820297][   T26] EXT4-fs (loop1): dirty_blocks=16
[  204.825491][   T26] EXT4-fs (loop1): Block reservation details
[  204.831509][   T26] EXT4-fs (loop1): i_reserved_data_blocks=1
[  204.838376][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:39 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:39 executing program 1:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)

21:29:39 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(r0, r1)

21:29:39 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

21:29:39 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x5030000)

21:29:39 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, 0x0, &(0x7f0000000200))
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:39 executing program 5:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:39 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x6000000)

21:29:39 executing program 1:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
getpgid(0xffffffffffffffff)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(0xffffffffffffffff, r2, 0x0, 0x80040)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118)

[  205.502369][ T6187] loop1: detected capacity change from 0 to 2048
[  205.517070][ T6187] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  205.531826][ T6187] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz-executor.1: bg 0: block 234: padding at end of block bitmap is not set
21:29:39 executing program 5:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:39 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

[  205.561299][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:39 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x6030000)

[  205.609780][ T6204] loop1: detected capacity change from 0 to 2048
[  205.628298][ T6204] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  205.663249][   T26] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set
[  205.678166][   T26] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  205.690456][   T26] EXT4-fs (loop1): This should not happen!! Data will be lost
[  205.690456][   T26] 
[  205.700492][   T26] EXT4-fs (loop1): Total free blocks count 0
[  205.706723][   T26] EXT4-fs (loop1): Free/Dirty block details
[  205.712605][   T26] EXT4-fs (loop1): free_blocks=0
[  205.717551][   T26] EXT4-fs (loop1): dirty_blocks=16
[  205.722648][   T26] EXT4-fs (loop1): Block reservation details
[  205.728637][   T26] EXT4-fs (loop1): i_reserved_data_blocks=1
[  205.735670][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:40 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r3)
socket$inet_udp(0x2, 0x2, 0x0)

21:29:40 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:40 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x7000000)

21:29:40 executing program 5:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:40 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(r0, r1)

21:29:40 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:40 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(r0, 0xffffffffffffffff)

21:29:40 executing program 1:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:40 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
truncate(0x0, 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:40 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x8030000)

21:29:40 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
socket$inet(0x2b, 0x0, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:40 executing program 1:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:40 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(r0, 0xffffffffffffffff)

21:29:41 executing program 5:
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[]}, @devid})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
dup2(r0, 0xffffffffffffffff)

21:29:41 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xa030000)

21:29:41 executing program 0:
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:41 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:41 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r3)
r6 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)

21:29:41 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:41 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:41 executing program 1:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)

21:29:41 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:41 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xc030000)

21:29:41 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:41 executing program 1:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
getpgid(0xffffffffffffffff)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118)

[  207.290936][ T6259] loop1: detected capacity change from 0 to 2048
[  207.306692][ T6259] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:29:41 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xe010000)

21:29:41 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

[  207.332677][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:41 executing program 0:
r0 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

[  207.373313][ T6271] loop1: detected capacity change from 0 to 2048
[  207.388993][ T6271] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  207.414173][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:42 executing program 1:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(0x0, 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)

21:29:42 executing program 0:
r0 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:42 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x18010000)

21:29:42 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:42 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:42 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:42 executing program 0:
r0 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:42 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:42 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:42 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
dup2(0xffffffffffffffff, r0)

21:29:42 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r2 = inotify_init1(0x0)
r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r5=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r6 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r7 = dup2(r0, r4)
r8 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=<r9=>0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7})
ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  208.105433][ T6288] loop1: detected capacity change from 0 to 2048
[  208.128168][ T6288] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:29:42 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:42 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

[  208.155511][   T52] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
[  208.170689][   T52] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117
[  208.183067][   T52] EXT4-fs (loop1): This should not happen!! Data will be lost
[  208.183067][   T52] 
21:29:42 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x20000000)

21:29:42 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:42 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

[  208.202936][ T3094] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:43 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:43 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:43 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:43 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x24000000)

21:29:43 executing program 0:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0)

21:29:43 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r2 = inotify_init1(0x0)
r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r5=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r6 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r7 = dup2(r0, r4)
r8 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=<r9=>0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7})
ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:43 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

[  208.941486][   T27] kauditd_printk_skb: 323 callbacks suppressed
[  208.941560][   T27] audit: type=1326 audit(1702502983.262:6706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6317 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:43 executing program 0:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

21:29:43 executing program 0:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

21:29:43 executing program 0:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

[  208.971826][   T27] audit: type=1326 audit(1702502983.272:6707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  208.995821][   T27] audit: type=1326 audit(1702502983.272:6708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:43 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r2 = inotify_init1(0x0)
r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r5=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r6 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r7 = dup2(r0, r4)
r8 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=<r9=>0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7})
ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  209.019933][   T27] audit: type=1326 audit(1702502983.272:6709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  209.044043][   T27] audit: type=1326 audit(1702502983.272:6710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  209.068619][   T27] audit: type=1326 audit(1702502983.272:6711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  209.092713][   T27] audit: type=1326 audit(1702502983.272:6712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  209.116672][   T27] audit: type=1326 audit(1702502983.272:6713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:43 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  209.140938][   T27] audit: type=1326 audit(1702502983.272:6714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  209.164920][   T27] audit: type=1326 audit(1702502983.272:6715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6322 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:44 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:44 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r2 = inotify_init1(0x0)
r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r5=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r6 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r7 = dup2(r0, r4)
r8 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=<r9=>0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7})
ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:44 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:44 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:44 executing program 5:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0)

21:29:44 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x24030000)

21:29:44 executing program 5:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0)

21:29:44 executing program 5:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0)

21:29:44 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:44 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:44 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:44 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x25030000)

[  209.868282][ T6353] blktrace: Concurrent blktraces are not allowed on loop3
21:29:44 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:44 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:44 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r2 = inotify_init1(0x0)
r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r5=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r6 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r7 = dup2(r0, r4)
r8 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=<r9=>0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7})
ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:44 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:44 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x35030000)

21:29:44 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:45 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x36030000)

21:29:45 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
r7 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0))
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  210.723133][ T6380] blktrace: Concurrent blktraces are not allowed on loop3
[  210.803423][ T6402] blktrace: Concurrent blktraces are not allowed on loop3
21:29:45 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, 0x0, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:45 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 0:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, 0x0, 0x0)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)

21:29:45 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x37030000)

21:29:45 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
r7 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x0, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  211.535289][ T6413] loop0: detected capacity change from 0 to 2048
[  211.547087][ T6413] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  211.574591][ T6405] blktrace: Concurrent blktraces are not allowed on loop3
21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00'})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

21:29:45 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x39030000)

21:29:45 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0)

[  211.586376][ T6413] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz-executor.0: bg 0: block 234: padding at end of block bitmap is not set
[  211.634688][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:46 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, 0x0, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:46 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
r7 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:46 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
r7 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:46 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x0, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:46 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x60000000)

21:29:46 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0)

21:29:46 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(0xffffffffffffffff, 0x54e3, 0x0)

21:29:46 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xc3ffffff)

21:29:46 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x0, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:46 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:46 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
r7 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r7, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0))
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:46 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
getpgid(0xffffffffffffffff)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(0x0, 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118)

[  212.445065][ T6436] blktrace: Concurrent blktraces are not allowed on loop3
[  212.458024][ T6440] blktrace: Concurrent blktraces are not allowed on loop1
[  212.513997][ T6453] loop5: detected capacity change from 0 to 2048
[  212.529016][ T6453] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  212.529185][ T6451] blktrace: Concurrent blktraces are not allowed on loop3
[  212.548420][ T6454] blktrace: Concurrent blktraces are not allowed on loop1
[  212.569350][   T26] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:1: bg 0: block 234: padding at end of block bitmap is not set
[  212.584137][   T26] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  212.596423][   T26] EXT4-fs (loop5): This should not happen!! Data will be lost
[  212.596423][   T26] 
[  212.606083][   T26] EXT4-fs (loop5): Total free blocks count 0
[  212.612059][   T26] EXT4-fs (loop5): Free/Dirty block details
[  212.617953][   T26] EXT4-fs (loop5): free_blocks=0
[  212.622915][   T26] EXT4-fs (loop5): dirty_blocks=16
[  212.628039][   T26] EXT4-fs (loop5): Block reservation details
[  212.634003][   T26] EXT4-fs (loop5): i_reserved_data_blocks=1
[  212.640677][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:29:47 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, 0x0, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:47 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xfdfdffff)

21:29:47 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(0x0, 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:47 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x0, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:47 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
getpgid(0xffffffffffffffff)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(0x0, 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118)

21:29:47 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:47 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xfeffffff)

21:29:47 executing program 0:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, 0x0, 0x0)
r1 = open(&(0x7f0000000000)='./bus\x00', 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)

[  213.238581][ T6463] loop5: detected capacity change from 0 to 2048
[  213.257272][ T6463] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:29:47 executing program 5:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r2 = inotify_init1(0x0)
r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r5=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r6 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r7 = dup2(r0, r4)
r8 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=<r9=>0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7})
ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001740))

21:29:47 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(0x0, 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  213.296452][   T52] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm kworker/u4:4: bg 0: block 234: padding at end of block bitmap is not set
[  213.324644][   T52] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28
[  213.336891][   T52] EXT4-fs (loop5): This should not happen!! Data will be lost
[  213.336891][   T52] 
[  213.340549][ T6479] loop0: detected capacity change from 0 to 2048
[  213.346549][   T52] EXT4-fs (loop5): Total free blocks count 0
[  213.358942][   T52] EXT4-fs (loop5): Free/Dirty block details
[  213.364868][   T52] EXT4-fs (loop5): free_blocks=0
[  213.369867][   T52] EXT4-fs (loop5): dirty_blocks=16
[  213.375059][   T52] EXT4-fs (loop5): Block reservation details
[  213.378067][ T6479] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:29:47 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:47 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(0x0, 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  213.381245][   T52] EXT4-fs (loop5): i_reserved_data_blocks=1
[  213.400154][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  213.448402][ T6479] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz-executor.0: bg 0: block 234: padding at end of block bitmap is not set
[  213.470845][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  213.483252][ T6483] blktrace: Concurrent blktraces are not allowed on loop3
21:29:48 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:48 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffdfd)

21:29:48 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r2 = inotify_init1(0x0)
r3 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r5=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r3}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r5})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r6 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r7 = dup2(r0, r4)
r8 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xd9f, 0x0, 0x100000000000}, {}, 0x100, 0x0, 0x2, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x3}}, 0xe8)
connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001bc0)=<r9=>0x0)
ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001c80)={{r8}, r9, 0x1c, @unused=[0x7, 0x0, 0xffffffff, 0x80000000], @subvolid=0x7})
ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001740))

21:29:48 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:48 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:48 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x3000480, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES64], 0xc5, 0x786, &(0x7f00000011c0)="$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")
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1)
getpgid(0xffffffffffffffff)
r1 = open(0x0, 0xe6942, 0x0)
r2 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0)
write$UHID_CREATE2(r1, &(0x7f00000007c0)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118)
sendfile(r1, r2, 0x0, 0x80040)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118)

[  214.109518][   T27] kauditd_printk_skb: 1369 callbacks suppressed
[  214.109529][   T27] audit: type=1326 audit(1702502988.432:8085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.122382][ T6500] loop5: detected capacity change from 0 to 2048
21:29:48 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 1)

[  214.139923][   T27] audit: type=1326 audit(1702502988.432:8086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.139957][   T27] audit: type=1326 audit(1702502988.432:8087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6494 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  214.139975][   T27] audit: type=1326 audit(1702502988.432:8088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6494 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  214.149922][   T27] audit: type=1326 audit(1702502988.432:8089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.230646][ T6500] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:29:48 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 1)
dup2(0xffffffffffffffff, r0)

[  214.242295][   T27] audit: type=1326 audit(1702502988.432:8090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.278906][   T27] audit: type=1326 audit(1702502988.432:8091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.302880][   T27] audit: type=1326 audit(1702502988.432:8092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.326961][   T27] audit: type=1326 audit(1702502988.432:8093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.350975][   T27] audit: type=1326 audit(1702502988.432:8094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6491 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f63dbe93ba9 code=0x7ffc0000
[  214.379741][ T3141] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  214.381290][ T6508] FAULT_INJECTION: forcing a failure.
[  214.381290][ T6508] name failslab, interval 1, probability 0, space 0, times 0
[  214.401501][ T6508] CPU: 1 PID: 6508 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  214.411831][ T6508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  214.421996][ T6508] Call Trace:
[  214.425302][ T6508]  <TASK>
[  214.428268][ T6508]  dump_stack_lvl+0xda/0x130
[  214.432866][ T6508]  dump_stack+0x15/0x20
[  214.437029][ T6508]  should_fail_ex+0x21f/0x230
[  214.441728][ T6508]  __should_failslab+0x92/0xa0
[  214.446550][ T6508]  should_failslab+0x9/0x20
[  214.451047][ T6508]  slab_pre_alloc_hook+0x37/0x160
[  214.456503][ T6508]  ? alloc_inode+0x64/0x150
[  214.460997][ T6508]  kmem_cache_alloc_lru+0x47/0x200
[  214.466105][ T6508]  alloc_inode+0x64/0x150
[  214.470469][ T6508]  new_inode_pseudo+0x17/0x70
[  214.475138][ T6508]  __ns_get_path+0xd8/0x220
[  214.479636][ T6508]  ? __put_net+0x70/0x70
[  214.483946][ T6508]  open_related_ns+0x76/0x140
[  214.488678][ T6508]  __tun_chr_ioctl+0x9f3/0x1850
[  214.493530][ T6508]  tun_chr_ioctl+0x27/0x30
[  214.497943][ T6508]  ? tun_chr_poll+0x430/0x430
[  214.502645][ T6508]  __se_sys_ioctl+0xcf/0x140
[  214.507291][ T6508]  __x64_sys_ioctl+0x43/0x50
[  214.511876][ T6508]  do_syscall_64+0x44/0x110
[  214.516409][ T6508]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  214.522299][ T6508] RIP: 0033:0x7f63dbe93ba9
[  214.526705][ T6508] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  214.546457][ T6508] RSP: 002b:00007f63db1f50c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:29:48 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
r6 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:48 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:48 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xffffffc3)

[  214.554898][ T6508] RAX: ffffffffffffffda RBX: 00007f63dbfb3050 RCX: 00007f63dbe93ba9
[  214.562863][ T6508] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
[  214.570828][ T6508] RBP: 00007f63db1f5120 R08: 0000000000000000 R09: 0000000000000000
[  214.578796][ T6508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  214.587037][ T6508] R13: 000000000000006e R14: 00007f63dbfb3050 R15: 00007ffd6b7e2e78
[  214.595223][ T6508]  </TASK>
[  214.635399][ T6516] FAULT_INJECTION: forcing a failure.
[  214.635399][ T6516] name failslab, interval 1, probability 0, space 0, times 0
[  214.648221][ T6516] CPU: 1 PID: 6516 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  214.658528][ T6516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  214.668681][ T6516] Call Trace:
[  214.671958][ T6516]  <TASK>
[  214.674870][ T6516]  dump_stack_lvl+0xda/0x130
[  214.679499][ T6516]  dump_stack+0x15/0x20
[  214.683709][ T6516]  should_fail_ex+0x21f/0x230
[  214.688434][ T6516]  ? getname_flags+0x85/0x360
[  214.693176][ T6516]  __should_failslab+0x92/0xa0
[  214.697954][ T6516]  should_failslab+0x9/0x20
[  214.702459][ T6516]  kmem_cache_alloc+0x4e/0x250
[  214.707243][ T6516]  getname_flags+0x85/0x360
[  214.711860][ T6516]  getname+0x19/0x20
[  214.715826][ T6516]  do_sys_openat2+0x67/0x110
[  214.720412][ T6516]  __x64_sys_openat+0xf3/0x120
[  214.725173][ T6516]  do_syscall_64+0x44/0x110
[  214.729700][ T6516]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  214.735610][ T6516] RIP: 0033:0x7f03d5f377a0
[  214.740081][ T6516] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44
[  214.759704][ T6516] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  214.768168][ T6516] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0
[  214.776195][ T6516] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c
21:29:49 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  214.784158][ T6516] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000
[  214.792196][ T6516] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[  214.800149][ T6516] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8
[  214.808105][ T6516]  </TASK>
[  214.816410][ T6511] blktrace: Concurrent blktraces are not allowed on loop3
21:29:49 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 2)
dup2(0xffffffffffffffff, r0)

21:29:49 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 2)

21:29:49 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:49 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffffe)

21:29:49 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:49 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  214.949683][ T6525] FAULT_INJECTION: forcing a failure.
[  214.949683][ T6525] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  214.962852][ T6525] CPU: 0 PID: 6525 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  214.968124][ T6529] FAULT_INJECTION: forcing a failure.
[  214.968124][ T6529] name failslab, interval 1, probability 0, space 0, times 0
[  214.973185][ T6525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  214.995969][ T6525] Call Trace:
[  214.999242][ T6525]  <TASK>
[  215.002163][ T6525]  dump_stack_lvl+0xda/0x130
[  215.006776][ T6525]  dump_stack+0x15/0x20
[  215.010942][ T6525]  should_fail_ex+0x21f/0x230
[  215.015701][ T6525]  should_fail+0xb/0x10
[  215.019861][ T6525]  should_fail_usercopy+0x1a/0x20
[  215.024983][ T6525]  strncpy_from_user+0x25/0x270
[  215.029836][ T6525]  ? kmem_cache_alloc+0x15a/0x250
[  215.034878][ T6525]  getname_flags+0xb3/0x360
[  215.039444][ T6525]  getname+0x19/0x20
[  215.043366][ T6525]  do_sys_openat2+0x67/0x110
[  215.047954][ T6525]  __x64_sys_openat+0xf3/0x120
[  215.052717][ T6525]  do_syscall_64+0x44/0x110
[  215.057293][ T6525]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  215.063221][ T6525] RIP: 0033:0x7f03d5f377a0
[  215.067623][ T6525] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44
[  215.087303][ T6525] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  215.095797][ T6525] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0
[  215.103772][ T6525] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c
[  215.111739][ T6525] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000
[  215.119735][ T6525] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[  215.127697][ T6525] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8
[  215.135691][ T6525]  </TASK>
[  215.138752][ T6529] CPU: 1 PID: 6529 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  215.149097][ T6529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  215.159204][ T6529] Call Trace:
[  215.162470][ T6529]  <TASK>
[  215.165402][ T6529]  dump_stack_lvl+0xda/0x130
[  215.170015][ T6529]  dump_stack+0x15/0x20
[  215.174254][ T6529]  should_fail_ex+0x21f/0x230
[  215.178944][ T6529]  ? memcg_list_lru_alloc+0x135/0x750
[  215.184384][ T6529]  __should_failslab+0x92/0xa0
[  215.189174][ T6529]  should_failslab+0x9/0x20
[  215.193769][ T6529]  __kmem_cache_alloc_node+0x4e/0x210
[  215.199227][ T6529]  ? __rcu_read_unlock+0x4d/0x70
[  215.204169][ T6529]  ? memcg_list_lru_alloc+0x135/0x750
[  215.209586][ T6529]  __kmalloc+0x95/0x1a0
[  215.213741][ T6529]  memcg_list_lru_alloc+0x135/0x750
[  215.218983][ T6529]  ? update_load_avg+0x1f7/0x760
[  215.223920][ T6529]  slab_pre_alloc_hook+0xe0/0x160
[  215.229033][ T6529]  ? alloc_inode+0x64/0x150
[  215.233530][ T6529]  kmem_cache_alloc_lru+0x47/0x200
[  215.238707][ T6529]  alloc_inode+0x64/0x150
[  215.243032][ T6529]  new_inode_pseudo+0x17/0x70
[  215.247712][ T6529]  __ns_get_path+0xd8/0x220
[  215.252211][ T6529]  ? __put_net+0x70/0x70
[  215.256621][ T6529]  open_related_ns+0x76/0x140
[  215.261330][ T6529]  __tun_chr_ioctl+0x9f3/0x1850
[  215.266232][ T6529]  tun_chr_ioctl+0x27/0x30
[  215.270798][ T6529]  ? tun_chr_poll+0x430/0x430
[  215.275561][ T6529]  __se_sys_ioctl+0xcf/0x140
[  215.280195][ T6529]  __x64_sys_ioctl+0x43/0x50
[  215.284810][ T6529]  do_syscall_64+0x44/0x110
[  215.289315][ T6529]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  215.295204][ T6529] RIP: 0033:0x7f63dbe93ba9
[  215.299645][ T6529] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  215.319344][ T6529] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  215.327833][ T6529] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9
[  215.335847][ T6529] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
21:29:49 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:49 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 3)
dup2(0xffffffffffffffff, r0)

[  215.343828][ T6529] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000
[  215.351791][ T6529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  215.359752][ T6529] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78
[  215.367854][ T6529]  </TASK>
[  215.407375][ T6544] FAULT_INJECTION: forcing a failure.
[  215.407375][ T6544] name failslab, interval 1, probability 0, space 0, times 0
[  215.420049][ T6544] CPU: 0 PID: 6544 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  215.430365][ T6544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  215.440561][ T6544] Call Trace:
[  215.443823][ T6544]  <TASK>
[  215.446780][ T6544]  dump_stack_lvl+0xda/0x130
[  215.451426][ T6544]  dump_stack+0x15/0x20
[  215.455648][ T6544]  should_fail_ex+0x21f/0x230
[  215.460417][ T6544]  ? alloc_empty_file+0xd0/0x310
[  215.465400][ T6544]  __should_failslab+0x92/0xa0
[  215.470223][ T6544]  should_failslab+0x9/0x20
[  215.474720][ T6544]  kmem_cache_alloc+0x4e/0x250
[  215.479483][ T6544]  alloc_empty_file+0xd0/0x310
[  215.484247][ T6544]  path_openat+0x69/0x1d70
[  215.488672][ T6544]  ? _parse_integer+0x27/0x30
[  215.493533][ T6544]  ? kstrtoull+0x110/0x140
[  215.498016][ T6544]  ? kstrtouint+0x77/0xb0
[  215.502418][ T6544]  do_filp_open+0xf6/0x200
[  215.506829][ T6544]  do_sys_openat2+0xab/0x110
[  215.511426][ T6544]  __x64_sys_openat+0xf3/0x120
[  215.516257][ T6544]  do_syscall_64+0x44/0x110
[  215.520763][ T6544]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  215.526724][ T6544] RIP: 0033:0x7f03d5f377a0
[  215.531131][ T6544] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44
21:29:49 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:49 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 4)
dup2(0xffffffffffffffff, r0)

21:29:49 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000000000000)

21:29:49 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  215.550729][ T6544] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  215.559143][ T6544] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0
[  215.567125][ T6544] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c
[  215.575085][ T6544] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000
[  215.583134][ T6544] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[  215.591112][ T6544] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8
[  215.599172][ T6544]  </TASK>
[  215.645374][ T6554] FAULT_INJECTION: forcing a failure.
[  215.645374][ T6554] name failslab, interval 1, probability 0, space 0, times 0
[  215.658033][ T6554] CPU: 1 PID: 6554 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  215.668348][ T6554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  215.678450][ T6554] Call Trace:
[  215.681718][ T6554]  <TASK>
[  215.684635][ T6554]  dump_stack_lvl+0xda/0x130
[  215.689260][ T6554]  dump_stack+0x15/0x20
[  215.693487][ T6554]  should_fail_ex+0x21f/0x230
[  215.698167][ T6554]  ? security_file_alloc+0x32/0xd0
[  215.703320][ T6554]  __should_failslab+0x92/0xa0
[  215.708099][ T6554]  should_failslab+0x9/0x20
[  215.712659][ T6554]  kmem_cache_alloc+0x4e/0x250
[  215.717417][ T6554]  ? alloc_empty_file+0xd0/0x310
[  215.722350][ T6554]  security_file_alloc+0x32/0xd0
[  215.727281][ T6554]  alloc_empty_file+0x121/0x310
[  215.732129][ T6554]  path_openat+0x69/0x1d70
[  215.736622][ T6554]  ? _parse_integer+0x27/0x30
[  215.741296][ T6554]  ? kstrtoull+0x110/0x140
[  215.745751][ T6554]  ? kstrtouint+0x77/0xb0
[  215.750137][ T6554]  do_filp_open+0xf6/0x200
[  215.754735][ T6554]  do_sys_openat2+0xab/0x110
[  215.759379][ T6554]  __x64_sys_openat+0xf3/0x120
[  215.764212][ T6554]  do_syscall_64+0x44/0x110
[  215.768832][ T6554]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  215.774752][ T6554] RIP: 0033:0x7f03d5f377a0
[  215.779162][ T6554] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44
[  215.799284][ T6554] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  215.807702][ T6554] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0
[  215.816097][ T6554] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c
[  215.824058][ T6554] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000
[  215.832065][ T6554] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
21:29:50 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:50 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 3)

21:29:50 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:50 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  215.840028][ T6554] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8
[  215.847999][ T6554]  </TASK>
21:29:50 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0xfffffffffffffe6e, &(0x7f0000001780)={&(0x7f0000001840)=ANY=[], 0x26}}, 0x0)
r6 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:50 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 5)
dup2(0xffffffffffffffff, r0)

21:29:50 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3000000000000)

[  215.912928][ T6561] FAULT_INJECTION: forcing a failure.
[  215.912928][ T6561] name failslab, interval 1, probability 0, space 0, times 0
[  215.918504][ T6567] FAULT_INJECTION: forcing a failure.
[  215.918504][ T6567] name failslab, interval 1, probability 0, space 0, times 0
[  215.925617][ T6561] CPU: 1 PID: 6561 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  215.948781][ T6561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  215.958865][ T6561] Call Trace:
[  215.962133][ T6561]  <TASK>
[  215.965075][ T6561]  dump_stack_lvl+0xda/0x130
[  215.969669][ T6561]  dump_stack+0x15/0x20
[  215.973832][ T6561]  should_fail_ex+0x21f/0x230
[  215.978510][ T6561]  ? memcg_list_lru_alloc+0x1e1/0x750
[  215.983937][ T6561]  __should_failslab+0x92/0xa0
[  215.988705][ T6561]  should_failslab+0x9/0x20
[  215.993228][ T6561]  __kmem_cache_alloc_node+0x4e/0x210
[  215.998656][ T6561]  ? __rcu_read_unlock+0x4d/0x70
[  216.003629][ T6561]  ? memcg_list_lru_alloc+0x1e1/0x750
[  216.009114][ T6561]  __kmalloc+0x95/0x1a0
[  216.013351][ T6561]  memcg_list_lru_alloc+0x1e1/0x750
[  216.018554][ T6561]  ? update_load_avg+0x1f7/0x760
[  216.023492][ T6561]  slab_pre_alloc_hook+0xe0/0x160
[  216.028522][ T6561]  ? alloc_inode+0x64/0x150
[  216.033174][ T6561]  kmem_cache_alloc_lru+0x47/0x200
[  216.038403][ T6561]  alloc_inode+0x64/0x150
[  216.042726][ T6561]  new_inode_pseudo+0x17/0x70
[  216.047471][ T6561]  __ns_get_path+0xd8/0x220
[  216.051965][ T6561]  ? __put_net+0x70/0x70
[  216.056207][ T6561]  open_related_ns+0x76/0x140
[  216.060908][ T6561]  __tun_chr_ioctl+0x9f3/0x1850
[  216.065777][ T6561]  tun_chr_ioctl+0x27/0x30
[  216.070299][ T6561]  ? tun_chr_poll+0x430/0x430
[  216.075007][ T6561]  __se_sys_ioctl+0xcf/0x140
[  216.079599][ T6561]  __x64_sys_ioctl+0x43/0x50
[  216.084190][ T6561]  do_syscall_64+0x44/0x110
[  216.088700][ T6561]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  216.094683][ T6561] RIP: 0033:0x7f63dbe93ba9
[  216.099143][ T6561] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  216.118742][ T6561] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  216.127170][ T6561] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9
[  216.135131][ T6561] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
[  216.143135][ T6561] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000
[  216.151145][ T6561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  216.159110][ T6561] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78
[  216.167074][ T6561]  </TASK>
[  216.170091][ T6567] CPU: 0 PID: 6567 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  216.180613][ T6567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  216.190672][ T6567] Call Trace:
[  216.194004][ T6567]  <TASK>
[  216.196925][ T6567]  dump_stack_lvl+0xda/0x130
[  216.201522][ T6567]  dump_stack+0x15/0x20
[  216.205739][ T6567]  should_fail_ex+0x21f/0x230
[  216.210626][ T6567]  ? usbdev_open+0x4d/0x480
[  216.215216][ T6567]  __should_failslab+0x92/0xa0
[  216.220011][ T6567]  should_failslab+0x9/0x20
[  216.224572][ T6567]  __kmem_cache_alloc_node+0x4e/0x210
[  216.229946][ T6567]  ? usbdev_open+0x4d/0x480
[  216.234521][ T6567]  kmalloc_trace+0x2a/0xa0
[  216.238931][ T6567]  usbdev_open+0x4d/0x480
[  216.243271][ T6567]  ? chrdev_open+0x311/0x390
[  216.247876][ T6567]  chrdev_open+0x322/0x390
[  216.252286][ T6567]  ? cd_forget+0xe0/0xe0
[  216.256609][ T6567]  do_dentry_open+0x635/0xbd0
[  216.261335][ T6567]  vfs_open+0x4a/0x50
[  216.265308][ T6567]  path_openat+0x1819/0x1d70
[  216.269889][ T6567]  ? _parse_integer+0x27/0x30
[  216.274562][ T6567]  do_filp_open+0xf6/0x200
[  216.279025][ T6567]  do_sys_openat2+0xab/0x110
[  216.283608][ T6567]  __x64_sys_openat+0xf3/0x120
[  216.288378][ T6567]  do_syscall_64+0x44/0x110
[  216.292935][ T6567]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  216.298824][ T6567] RIP: 0033:0x7f03d5f377a0
[  216.303224][ T6567] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44
[  216.322819][ T6567] RSP: 002b:00007f03d52bac00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  216.331231][ T6567] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03d5f377a0
[  216.339236][ T6567] RDX: 0000000000000000 RSI: 00007f03d52baca0 RDI: 00000000ffffff9c
[  216.347195][ T6567] RBP: 00007f03d52baca0 R08: 0000000000000000 R09: 0000000000000000
[  216.355201][ T6567] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
21:29:50 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (fail_nth: 6)
dup2(0xffffffffffffffff, r0)

21:29:50 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 4)

[  216.363192][ T6567] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8
[  216.371219][ T6567]  </TASK>
[  216.427749][ T6575] FAULT_INJECTION: forcing a failure.
[  216.427749][ T6575] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  216.434050][ T6565] blktrace: Concurrent blktraces are not allowed on loop3
[  216.440824][ T6575] CPU: 1 PID: 6575 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  216.454189][ T6577] FAULT_INJECTION: forcing a failure.
[  216.454189][ T6577] name failslab, interval 1, probability 0, space 0, times 0
[  216.458218][ T6575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  216.458233][ T6575] Call Trace:
[  216.458239][ T6575]  <TASK>
[  216.458245][ T6575]  dump_stack_lvl+0xda/0x130
[  216.458280][ T6575]  dump_stack+0x15/0x20
[  216.495777][ T6575]  should_fail_ex+0x21f/0x230
[  216.500490][ T6575]  should_fail+0xb/0x10
[  216.504642][ T6575]  should_fail_usercopy+0x1a/0x20
[  216.509761][ T6575]  _copy_to_user+0x1e/0x90
[  216.514182][ T6575]  simple_read_from_buffer+0xa0/0x110
[  216.519630][ T6575]  proc_fail_nth_read+0xfc/0x140
[  216.524569][ T6575]  ? proc_fault_inject_write+0x210/0x210
[  216.530199][ T6575]  vfs_read+0x1a4/0x590
[  216.534358][ T6575]  ? mutex_lock+0xd/0x30
[  216.538599][ T6575]  ksys_read+0xeb/0x1a0
[  216.542811][ T6575]  __x64_sys_read+0x42/0x50
[  216.547393][ T6575]  do_syscall_64+0x44/0x110
[  216.551895][ T6575]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  216.557781][ T6575] RIP: 0033:0x7f03d5f3784c
[  216.562260][ T6575] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48
[  216.581922][ T6575] RSP: 002b:00007f03d52bb0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  216.590443][ T6575] RAX: ffffffffffffffda RBX: 00007f03d6057f80 RCX: 00007f03d5f3784c
[  216.598427][ T6575] RDX: 000000000000000f RSI: 00007f03d52bb130 RDI: 0000000000000003
[  216.606398][ T6575] RBP: 00007f03d52bb120 R08: 0000000000000000 R09: 0000000000000000
[  216.614457][ T6575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
21:29:50 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xb000000000000)

21:29:50 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0)

[  216.622420][ T6575] R13: 000000000000000b R14: 00007f03d6057f80 R15: 00007ffc73546ee8
[  216.630460][ T6575]  </TASK>
[  216.633468][ T6577] CPU: 0 PID: 6577 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  216.643889][ T6577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  216.653955][ T6577] Call Trace:
[  216.657241][ T6577]  <TASK>
[  216.660193][ T6577]  dump_stack_lvl+0xda/0x130
[  216.664929][ T6577]  dump_stack+0x15/0x20
[  216.669100][ T6577]  should_fail_ex+0x21f/0x230
[  216.673788][ T6577]  ? security_inode_alloc+0x32/0xd0
21:29:51 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:51 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x2)
dup2(0xffffffffffffffff, r0)

[  216.678996][ T6577]  __should_failslab+0x92/0xa0
[  216.683768][ T6577]  should_failslab+0x9/0x20
[  216.688340][ T6577]  kmem_cache_alloc+0x4e/0x250
[  216.693175][ T6577]  security_inode_alloc+0x32/0xd0
[  216.698192][ T6577]  inode_init_always+0x428/0x460
[  216.703122][ T6577]  alloc_inode+0x77/0x150
[  216.707497][ T6577]  new_inode_pseudo+0x17/0x70
[  216.712175][ T6577]  __ns_get_path+0xd8/0x220
[  216.716753][ T6577]  ? __put_net+0x70/0x70
[  216.721077][ T6577]  open_related_ns+0x76/0x140
21:29:51 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3)
dup2(0xffffffffffffffff, r0)

[  216.725772][ T6577]  __tun_chr_ioctl+0x9f3/0x1850
[  216.730655][ T6577]  tun_chr_ioctl+0x27/0x30
[  216.735110][ T6577]  ? tun_chr_poll+0x430/0x430
[  216.739810][ T6577]  __se_sys_ioctl+0xcf/0x140
[  216.744417][ T6577]  __x64_sys_ioctl+0x43/0x50
[  216.749111][ T6577]  do_syscall_64+0x44/0x110
[  216.753699][ T6577]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  216.759649][ T6577] RIP: 0033:0x7f63dbe93ba9
21:29:51 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4)
dup2(0xffffffffffffffff, r0)

[  216.764188][ T6577] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  216.783929][ T6577] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  216.792322][ T6577] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9
[  216.800343][ T6577] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
[  216.808375][ T6577] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000
[  216.816351][ T6577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
21:29:51 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
r6 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:51 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:51 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x18)
dup2(0xffffffffffffffff, r0)

21:29:51 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x100000000000000)

[  216.824324][ T6577] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78
[  216.832368][ T6577]  </TASK>
21:29:51 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc0)
dup2(0xffffffffffffffff, r0)

21:29:51 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 5)

21:29:51 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe0)
dup2(0xffffffffffffffff, r0)

21:29:51 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  216.959815][ T6610] FAULT_INJECTION: forcing a failure.
[  216.959815][ T6610] name failslab, interval 1, probability 0, space 0, times 0
[  216.972541][ T6610] CPU: 1 PID: 6610 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  216.982851][ T6610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  216.992898][ T6610] Call Trace:
[  216.996248][ T6610]  <TASK>
[  216.999162][ T6610]  dump_stack_lvl+0xda/0x130
[  217.003810][ T6610]  dump_stack+0x15/0x20
[  217.008036][ T6610]  should_fail_ex+0x21f/0x230
[  217.012757][ T6610]  ? memcg_list_lru_alloc+0x1e1/0x750
[  217.018214][ T6610]  __should_failslab+0x92/0xa0
[  217.023057][ T6610]  should_failslab+0x9/0x20
[  217.027573][ T6610]  __kmem_cache_alloc_node+0x4e/0x210
[  217.033005][ T6610]  ? __rcu_read_unlock+0x4d/0x70
[  217.037997][ T6610]  ? memcg_list_lru_alloc+0x1e1/0x750
[  217.043442][ T6610]  __kmalloc+0x95/0x1a0
[  217.047595][ T6610]  memcg_list_lru_alloc+0x1e1/0x750
[  217.052920][ T6610]  slab_pre_alloc_hook+0xe0/0x160
[  217.058037][ T6610]  ? __d_alloc+0x3d/0x380
[  217.062362][ T6610]  kmem_cache_alloc_lru+0x47/0x200
[  217.067611][ T6610]  __d_alloc+0x3d/0x380
[  217.071769][ T6610]  d_alloc_anon+0x17/0x20
[  217.076098][ T6610]  __ns_get_path+0x165/0x220
[  217.080725][ T6610]  ? __put_net+0x70/0x70
[  217.085082][ T6610]  open_related_ns+0x76/0x140
[  217.089871][ T6610]  __tun_chr_ioctl+0x9f3/0x1850
[  217.094897][ T6610]  tun_chr_ioctl+0x27/0x30
[  217.099351][ T6610]  ? tun_chr_poll+0x430/0x430
[  217.104071][ T6610]  __se_sys_ioctl+0xcf/0x140
[  217.108685][ T6610]  __x64_sys_ioctl+0x43/0x50
[  217.113265][ T6610]  do_syscall_64+0x44/0x110
[  217.117803][ T6610]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  217.123794][ T6610] RIP: 0033:0x7f63dbe93ba9
[  217.128195][ T6610] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  217.147827][ T6610] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  217.156368][ T6610] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9
[  217.164424][ T6610] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
[  217.172383][ T6610] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000
[  217.180340][ T6610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  217.188300][ T6610] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78
[  217.196267][ T6610]  </TASK>
21:29:51 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:51 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
r6 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:51 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x103000000000000)

21:29:51 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x140)
dup2(0xffffffffffffffff, r0)

21:29:51 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(0x0, 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:51 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 6)

[  217.616232][ T6622] FAULT_INJECTION: forcing a failure.
[  217.616232][ T6622] name failslab, interval 1, probability 0, space 0, times 0
[  217.629071][ T6622] CPU: 1 PID: 6622 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  217.639379][ T6622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  217.649545][ T6622] Call Trace:
[  217.652805][ T6622]  <TASK>
[  217.655717][ T6622]  dump_stack_lvl+0xda/0x130
[  217.660332][ T6622]  dump_stack+0x15/0x20
[  217.664505][ T6622]  should_fail_ex+0x21f/0x230
[  217.669193][ T6622]  ? alloc_empty_file+0xd0/0x310
[  217.674195][ T6622]  __should_failslab+0x92/0xa0
[  217.678991][ T6622]  should_failslab+0x9/0x20
[  217.683475][ T6622]  kmem_cache_alloc+0x4e/0x250
[  217.688230][ T6622]  ? __put_net+0x70/0x70
[  217.692590][ T6622]  alloc_empty_file+0xd0/0x310
[  217.697404][ T6622]  ? __put_net+0x70/0x70
[  217.701673][ T6622]  dentry_open+0x31/0xc0
[  217.705961][ T6622]  open_related_ns+0xbe/0x140
[  217.710696][ T6622]  __tun_chr_ioctl+0x9f3/0x1850
[  217.715570][ T6622]  tun_chr_ioctl+0x27/0x30
[  217.720031][ T6622]  ? tun_chr_poll+0x430/0x430
[  217.724898][ T6622]  __se_sys_ioctl+0xcf/0x140
[  217.729503][ T6622]  __x64_sys_ioctl+0x43/0x50
[  217.734161][ T6622]  do_syscall_64+0x44/0x110
[  217.738669][ T6622]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  217.744557][ T6622] RIP: 0033:0x7f63dbe93ba9
[  217.748957][ T6622] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  217.768576][ T6622] RSP: 002b:00007f63db2160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  217.776973][ T6622] RAX: ffffffffffffffda RBX: 00007f63dbfb2f80 RCX: 00007f63dbe93ba9
[  217.784929][ T6622] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
[  217.792885][ T6622] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000
[  217.800845][ T6622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  217.808820][ T6622] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78
21:29:52 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(0x0, 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:52 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x300)
dup2(0xffffffffffffffff, r0)

21:29:52 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x1ee000000000000)

[  217.816846][ T6622]  </TASK>
21:29:52 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(0x0, 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:52 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
r6 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:52 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1800)
dup2(0xffffffffffffffff, r0)

[  217.928718][ T6635] blktrace: Concurrent blktraces are not allowed on loop3
21:29:52 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:52 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0) (fail_nth: 7)

21:29:52 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x200000000000000)

21:29:52 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x2000)
dup2(0xffffffffffffffff, r0)

21:29:52 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:52 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
socket(0x10, 0x3, 0x0)
r5 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  218.470405][ T6644] FAULT_INJECTION: forcing a failure.
[  218.470405][ T6644] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  218.483553][ T6644] CPU: 0 PID: 6644 Comm: syz-executor.0 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  218.493863][ T6644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  218.503902][ T6644] Call Trace:
[  218.507186][ T6644]  <TASK>
[  218.510110][ T6644]  dump_stack_lvl+0xda/0x130
21:29:52 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3f00)
dup2(0xffffffffffffffff, r0)

[  218.511754][ T6649] blktrace: Concurrent blktraces are not allowed on loop3
[  218.514702][ T6644]  dump_stack+0x15/0x20
[  218.525968][ T6644]  should_fail_ex+0x21f/0x230
[  218.530707][ T6644]  should_fail+0xb/0x10
[  218.534901][ T6644]  should_fail_usercopy+0x1a/0x20
[  218.539973][ T6644]  _copy_from_user+0x1e/0xd0
[  218.544666][ T6644]  kstrtouint_from_user+0x76/0xe0
[  218.549772][ T6644]  ? 0xffffffff81000000
[  218.553965][ T6644]  proc_fail_nth_write+0x4f/0x150
[  218.559001][ T6644]  ? proc_fail_nth_read+0x140/0x140
[  218.564280][ T6644]  vfs_write+0x27a/0x790
21:29:52 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000)
dup2(0xffffffffffffffff, r0)

[  218.568541][ T6644]  ? mutex_lock+0xd/0x30
[  218.572841][ T6644]  ksys_write+0xeb/0x1a0
[  218.577165][ T6644]  __x64_sys_write+0x42/0x50
[  218.581739][ T6644]  do_syscall_64+0x44/0x110
[  218.586247][ T6644]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  218.592227][ T6644] RIP: 0033:0x7f63dbe928ef
[  218.596649][ T6644] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48
21:29:52 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001)
dup2(0xffffffffffffffff, r0)

21:29:53 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:53 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:53 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc000)
dup2(0xffffffffffffffff, r0)

[  218.616443][ T6644] RSP: 002b:00007f63db2160c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[  218.624859][ T6644] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f63dbe928ef
[  218.632826][ T6644] RDX: 0000000000000001 RSI: 00007f63db216130 RDI: 0000000000000004
[  218.640782][ T6644] RBP: 00007f63db216120 R08: 0000000000000000 R09: 0000000000000000
[  218.648746][ T6644] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[  218.656719][ T6644] R13: 000000000000000b R14: 00007f63dbfb2f80 R15: 00007ffd6b7e2e78
[  218.664777][ T6644]  </TASK>
21:29:53 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:53 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:53 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x400000000000000)

21:29:53 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:53 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe000)
dup2(0xffffffffffffffff, r0)

21:29:53 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x0)

[  219.325961][   T27] kauditd_printk_skb: 908 callbacks suppressed
[  219.325973][   T27] audit: type=1326 audit(1702502993.642:9003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6672 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
21:29:53 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(0x0, 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  219.356220][   T27] audit: type=1326 audit(1702502993.642:9004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6672 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  219.381058][   T27] audit: type=1326 audit(1702502993.652:9005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:53 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x10040)
dup2(0xffffffffffffffff, r0)

21:29:53 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x200000)
dup2(0xffffffffffffffff, r0)

[  219.405062][   T27] audit: type=1326 audit(1702502993.652:9006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  219.429004][   T27] audit: type=1326 audit(1702502993.652:9007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  219.452935][   T27] audit: type=1326 audit(1702502993.652:9008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:53 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1000000)
dup2(0xffffffffffffffff, r0)

21:29:53 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x2000000)
dup2(0xffffffffffffffff, r0)

[  219.476903][   T27] audit: type=1326 audit(1702502993.652:9009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  219.500936][   T27] audit: type=1326 audit(1702502993.652:9010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:53 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3000000)
dup2(0xffffffffffffffff, r0)

[  219.524850][   T27] audit: type=1326 audit(1702502993.652:9011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  219.548779][   T27] audit: type=1326 audit(1702502993.652:9012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6675 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:54 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:54 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000000)
dup2(0xffffffffffffffff, r0)

21:29:54 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:54 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x503000000000000)

21:29:54 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x2, 0x0)

21:29:54 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(0x0, 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:54 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xbd00380)
dup2(0xffffffffffffffff, r0)

21:29:54 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
r5 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:54 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(0x0, 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:54 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x600000000000000)

21:29:54 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x18000000)
dup2(0xffffffffffffffff, r0)

[  220.248373][ T6701] blktrace: Concurrent blktraces are not allowed on loop3
21:29:54 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x4b47, 0x0)

[  220.341740][ T6713] blktrace: Concurrent blktraces are not allowed on loop3
21:29:55 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:55 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3f000000)
dup2(0xffffffffffffffff, r0)

21:29:55 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x0, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:55 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r3=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r1}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r3})
r4 = dup2(r0, r2)
ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:55 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x603000000000000)

21:29:55 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x4b49, 0x0)

21:29:55 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x0, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:55 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x40000000)
dup2(0xffffffffffffffff, r0)

21:29:55 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x700000000000000)

21:29:55 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:55 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x541b, 0x0)

[  221.111036][ T6730] blktrace: Concurrent blktraces are not allowed on loop3
21:29:55 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x40000100)
dup2(0xffffffffffffffff, r0)

[  221.177025][ T6740] blktrace: Concurrent blktraces are not allowed on loop3
21:29:56 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:56 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:56 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x0, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:56 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x5421, 0x0)

21:29:56 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x803000000000000)

21:29:56 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x40010000)
dup2(0xffffffffffffffff, r0)

21:29:56 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4bdfffff)
dup2(0xffffffffffffffff, r0)

21:29:56 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4fdfffff)
dup2(0xffffffffffffffff, r0)

21:29:56 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x8003d00b)
dup2(0xffffffffffffffff, r0)

21:29:56 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc0000000)
dup2(0xffffffffffffffff, r0)

21:29:56 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:56 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:56 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xa03000000000000)

[  221.977459][ T6751] blktrace: Concurrent blktraces are not allowed on loop3
[  222.036629][ T6771] blktrace: Concurrent blktraces are not allowed on loop3
21:29:57 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:57 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x5450, 0x0)

21:29:57 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe0000000)
dup2(0xffffffffffffffff, r0)

21:29:57 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:57 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:57 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xc03000000000000)

21:29:57 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf3ffffff)
dup2(0xffffffffffffffff, r0)

21:29:57 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf6ffffff)
dup2(0xffffffffffffffff, r0)

21:29:57 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xffffdf4b)
dup2(0xffffffffffffffff, r0)

21:29:57 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xe01000000000000)

21:29:57 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xffffdf4f)
dup2(0xffffffffffffffff, r0)

21:29:57 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x0)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:57 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:57 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:57 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xfffffff3)
dup2(0xffffffffffffffff, r0)

21:29:57 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x5451, 0x0)

21:29:57 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x1801000000000000)

21:29:57 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(0x0, 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:57 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xfffffff6)
dup2(0xffffffffffffffff, r0)

21:29:58 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1000000000000)
dup2(0xffffffffffffffff, r0)

21:29:58 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(0x0, 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:58 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x20000000000000)
dup2(0xffffffffffffffff, r0)

21:29:58 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2000000000000000)

21:29:58 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  223.701260][ T6803] blktrace: Concurrent blktraces are not allowed on loop3
21:29:58 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x5452, 0x0)

21:29:58 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:58 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x100000000000000)
dup2(0xffffffffffffffff, r0)

21:29:58 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(0x0, 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:58 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2400000000000000)

21:29:58 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

[  224.495656][   T27] kauditd_printk_skb: 787 callbacks suppressed
[  224.495670][   T27] audit: type=1326 audit(1702502998.812:9800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  224.525813][   T27] audit: type=1326 audit(1702502998.812:9801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  224.553525][   T27] audit: type=1326 audit(1702502998.822:9802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:58 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  224.577575][   T27] audit: type=1326 audit(1702502998.822:9803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  224.601736][   T27] audit: type=1326 audit(1702502998.822:9804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:58 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x200000000000000)
dup2(0xffffffffffffffff, r0)

[  224.625838][   T27] audit: type=1326 audit(1702502998.822:9805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  224.649895][   T27] audit: type=1326 audit(1702502998.822:9806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:59 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x300000000000000)
dup2(0xffffffffffffffff, r0)

21:29:59 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:59 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2403000000000000)

21:29:59 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  224.673876][   T27] audit: type=1326 audit(1702502998.822:9807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  224.697866][   T27] audit: type=1326 audit(1702502998.822:9808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  224.721786][   T27] audit: type=1326 audit(1702502998.822:9809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:29:59 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x5460, 0x0)

21:29:59 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x400000000000000)
dup2(0xffffffffffffffff, r0)

21:29:59 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1800000000000000)
dup2(0xffffffffffffffff, r0)

21:29:59 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:59 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  224.827127][ T6851] blktrace: Concurrent blktraces are not allowed on loop3
[  224.890189][ T6861] blktrace: Concurrent blktraces are not allowed on loop3
21:29:59 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:29:59 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x2503000000000000)

21:29:59 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x3f00000000000000)
dup2(0xffffffffffffffff, r0)

21:29:59 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x8924, 0x0)

21:29:59 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x0, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:59 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:59 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:29:59 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:29:59 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000000000000000)
dup2(0xffffffffffffffff, r0)

21:29:59 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3503000000000000)

21:29:59 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  225.396544][ T6870] blktrace: Concurrent blktraces are not allowed on loop3
21:29:59 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x8927, 0x0)

21:30:00 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3603000000000000)

21:30:00 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4000010000000000)
dup2(0xffffffffffffffff, r0)

21:30:00 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:00 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x894c, 0x0)

21:30:00 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:00 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:00 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:00 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:00 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:00 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454c8, 0x0)

21:30:00 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001000000000000)
dup2(0xffffffffffffffff, r0)

21:30:00 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:00 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3703000000000000)

21:30:00 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4bdfffff00000000)
dup2(0xffffffffffffffff, r0)

21:30:00 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:00 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:01 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:01 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454c9, 0x0)

21:30:01 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x3903000000000000)

21:30:01 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:01 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4fdfffff00000000)
dup2(0xffffffffffffffff, r0)

21:30:01 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:01 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x8003d00b00000000)
dup2(0xffffffffffffffff, r0)

21:30:01 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:01 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:01 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454ca, 0x0)

21:30:01 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x6000000000000000)

[  227.108007][ T6934] blktrace: Concurrent blktraces are not allowed on loop3
21:30:01 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xc000000000000000)
dup2(0xffffffffffffffff, r0)

21:30:02 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:02 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:02 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:02 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xc3ffffff00000000)

21:30:02 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xe000000000000000)
dup2(0xffffffffffffffff, r0)

21:30:02 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cb, 0x0)

21:30:02 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:02 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xfdfdffff00000000)

21:30:02 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf3ffffff00000000)
dup2(0xffffffffffffffff, r0)

21:30:02 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cc, 0x0)

21:30:02 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:02 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  228.088824][ T6973] blktrace: Concurrent blktraces are not allowed on loop3
21:30:03 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0xfeffffff00000000)

21:30:03 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xf6ffffff00000000)
dup2(0xffffffffffffffff, r0)

21:30:03 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:03 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:03 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:03 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:03 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454ce, 0x0)

21:30:03 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0xffffffff00000000)
dup2(0xffffffffffffffff, r0)

21:30:03 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:03 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:03 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

[  228.836384][ T6978] blktrace: Concurrent blktraces are not allowed on loop3
21:30:03 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454d0, 0x0)

21:30:03 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1d1100)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000000)={0x621e, 0x1c, [{0xb}, {0x6, 0x1}, {0x7, 0x1}, {0x9, 0x1}, {0x7}, {0x6}, {0xe}, {0x0, 0x1}, {0xf, 0x1}, {0xf, 0x1}, {0x0, 0x1}, {0xe, 0x1}, {0xe}, {0x6}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0xc}, {0x1, 0x1}, {0xb, 0x1}, {0xa}, {0x4}, {0xb}, {0x9, 0x1}, {0x9, 0x1}]})

21:30:03 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)

21:30:03 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1d1100)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000000)={0x621e, 0x1c, [{0xb}, {0x6, 0x1}, {0x7, 0x1}, {0x9, 0x1}, {0x7}, {0x6}, {0xe}, {0x0, 0x1}, {0xf, 0x1}, {0xf, 0x1}, {0x0, 0x1}, {0xe, 0x1}, {0xe}, {0x6}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0xc}, {0x1, 0x1}, {0xb, 0x1}, {0xa}, {0x4}, {0xb}, {0x9, 0x1}, {0x9, 0x1}]})

21:30:03 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1d1100)
dup2(0xffffffffffffffff, r0) (async)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000000)={0x621e, 0x1c, [{0xb}, {0x6, 0x1}, {0x7, 0x1}, {0x9, 0x1}, {0x7}, {0x6}, {0xe}, {0x0, 0x1}, {0xf, 0x1}, {0xf, 0x1}, {0x0, 0x1}, {0xe, 0x1}, {0xe}, {0x6}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0xc}, {0x1, 0x1}, {0xb, 0x1}, {0xa}, {0x4}, {0xb}, {0x9, 0x1}, {0x9, 0x1}]})

21:30:03 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:03 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x87, @empty, 0x4e21, 0x1, 'ovf\x00', 0x1, 0x1, 0x60}, {@multicast2, 0x4e20, 0x0, 0x7f, 0x40, 0x7}}, 0x44)

21:30:03 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454d1, 0x0)

21:30:03 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:03 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:03 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x40000, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

[  229.640740][   T27] kauditd_printk_skb: 979 callbacks suppressed
[  229.640751][   T27] audit: type=1326 audit(1702503003.962:10789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7013 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  229.671070][   T27] audit: type=1326 audit(1702503003.962:10790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7013 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb16d9ccba9 code=0x7ffc0000
[  229.689431][ T7016] blktrace: Concurrent blktraces are not allowed on loop3
[  229.695395][   T27] audit: type=1326 audit(1702503003.972:10791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:04 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x87, @empty, 0x4e21, 0x1, 'ovf\x00', 0x1, 0x1, 0x60}, {@multicast2, 0x4e20, 0x0, 0x7f, 0x40, 0x7}}, 0x44)

21:30:04 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840), 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

[  229.726331][   T27] audit: type=1326 audit(1702503003.972:10792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  229.750336][   T27] audit: type=1326 audit(1702503003.972:10793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:04 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x87, @empty, 0x4e21, 0x1, 'ovf\x00', 0x1, 0x1, 0x60}, {@multicast2, 0x4e20, 0x0, 0x7f, 0x40, 0x7}}, 0x44)

[  229.774405][   T27] audit: type=1326 audit(1702503003.972:10794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  229.798495][   T27] audit: type=1326 audit(1702503003.972:10795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  229.822508][   T27] audit: type=1326 audit(1702503003.972:10796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  229.846574][   T27] audit: type=1326 audit(1702503003.972:10797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:04 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r2 = dup2(r0, r1)
write$eventfd(r1, &(0x7f0000000340), 0x8)
openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(r2, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r5 = dup2(r3, r4)
write$eventfd(r4, &(0x7f0000000340), 0x8)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r6, r7)
read$eventfd(r6, &(0x7f0000000300), 0x8)
r8 = syz_open_procfs$pagemap(0x0, &(0x7f00000001c0))
write$binfmt_script(r8, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, '!C^:N'}, {0x20, '^'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '$:#},-'}], 0xa, "0e85c46b05a3a66ceb25df58e58897e35038ca1028c7397619ac6dd447b8ceac005b187f57c8b92e9268a3bca38294a94d76d662d80fe721bac925a7f3e00604d1"}, 0xbf)
accept4$nfc_llcp(r5, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80800)
dup2(r2, r4)

21:30:04 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840), 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:04 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  229.870600][   T27] audit: type=1326 audit(1702503003.972:10798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  229.967107][ T7041] blktrace: Concurrent blktraces are not allowed on loop3
21:30:04 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:04 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840), 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:04 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x400, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
fsmount(0xffffffffffffffff, 0x1, 0x80)

21:30:04 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r2 = dup2(r0, r1)
write$eventfd(r1, &(0x7f0000000340), 0x8) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
openat$cgroup_ro(r2, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r5 = dup2(r3, r4) (async)
write$eventfd(r4, &(0x7f0000000340), 0x8) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r6, r7)
read$eventfd(r6, &(0x7f0000000300), 0x8) (async)
r8 = syz_open_procfs$pagemap(0x0, &(0x7f00000001c0))
write$binfmt_script(r8, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, '!C^:N'}, {0x20, '^'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '$:#},-'}], 0xa, "0e85c46b05a3a66ceb25df58e58897e35038ca1028c7397619ac6dd447b8ceac005b187f57c8b92e9268a3bca38294a94d76d662d80fe721bac925a7f3e00604d1"}, 0xbf) (async)
accept4$nfc_llcp(r5, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80800) (async)
dup2(r2, r4)

21:30:04 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:04 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454d4, 0x0)

21:30:04 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r2 = dup2(r0, r1) (async)
write$eventfd(r1, &(0x7f0000000340), 0x8) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
openat$cgroup_ro(r2, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r5 = dup2(r3, r4) (async)
write$eventfd(r4, &(0x7f0000000340), 0x8) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r6, r7)
read$eventfd(r6, &(0x7f0000000300), 0x8) (async)
r8 = syz_open_procfs$pagemap(0x0, &(0x7f00000001c0))
write$binfmt_script(r8, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, 'hugetlb.1GB.usage_in_bytes\x00'}, {0x20, '!C^:N'}, {0x20, '^'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '$:#},-'}], 0xa, "0e85c46b05a3a66ceb25df58e58897e35038ca1028c7397619ac6dd447b8ceac005b187f57c8b92e9268a3bca38294a94d76d662d80fe721bac925a7f3e00604d1"}, 0xbf)
accept4$nfc_llcp(r5, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80800) (async)
dup2(r2, r4)

21:30:04 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:04 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454d8, 0x0)

21:30:04 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:04 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x400, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async, rerun: 64)
fsmount(0xffffffffffffffff, 0x1, 0x80) (rerun: 64)

[  230.561149][ T7050] blktrace: Concurrent blktraces are not allowed on loop3
21:30:04 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1913c0)
ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"})
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xfffffffe})
dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"})

21:30:05 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:05 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:05 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1913c0)
ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"}) (async)
ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"})
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xfffffffe})
dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"})

21:30:05 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454d9, 0x0)

21:30:05 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:05 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x400, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
fsmount(0xffffffffffffffff, 0x1, 0x80)

21:30:05 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x1913c0)
ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x60, 0x14, 0x8000, 0x49ec, 0xe1, 0x7, &(0x7f0000000080)="a46478d7b2e4e1db3ff4e2668eee4660ca797f37bd529966247ab7348289c777178ac8f8a4f8bdf5232d2fb0aacf74decb73ec01ba1c6ae4a5478766b3766f1e0b2f8eead3625d33b4590be4a45dc6dcc6d5b179fb81fe8e2fe2e375d4d0369ab226a07d8e681385af8a760c6f4c765ab527b8b99e8366b10b422db621ab285acd255328c57714f87e1d5bfd426411bf255b9ea84d7815c817340410812bf79974479dc6761b0564515ea56c4a17ed2e937289e989464e70c68b12993db9f24dcb4983f7608772dc64504cd60abd075e824fa2b3d568ece45c2fc906ceba2582ce"})
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xfffffffe})
dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"}) (async)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0x8}, 0x5, 0x63, &(0x7f0000000180)="9dcf40da3acdfdfe6f91da6a466bc03bedfb13fdddfdecb0f3845048bc9860919a12de1ba70660a35d21b842de9132aa6dbf54d846ce50616b35cd893932a3e887b1145a10b3f29e7f4768a1bd1864074e128a328299c8de33c05f7ba0e81411b9cc97eb19dc5a10e2217be08cbc76c005de6c7efa19fa97d19c8061d5c6e87c85aa5aa7247670d7896ad36def67238800bf9f19e290a6d358db9a18735cdbade2559c0ab934250ca739d95dc4d664b40171210bab8e19a2d153ce64a363be8fa8cdc47b473f330d6ab2a1ebec288d26e2cd67dd2c3755dd8605ffcac3072ba3", 0xe0, 0x3ff, 0x401, 0x0, 0x0, 0x81, &(0x7f0000000280)="e6e52c6f15788b7232c81e1c8266d0330fbf3df00ec5c0193d3be5947513beb2e0238eac549fdc0439a38563aa"})

21:30:05 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect)
r1 = dup2(0xffffffffffffffff, r0)
r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x3, 0x10040)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r3, r4)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r5, r6)
write$eventfd(r6, &(0x7f0000000340), 0x8)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2d, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xc7b}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x672}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @printk={@d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x7f, 0x2, 0x3, 0x2, 0x6}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0x28, &(0x7f0000000280)=""/40, 0x40f00, 0x61, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x10, 0x1, 0x80000000}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000340)=[r1, r6], &(0x7f0000000380)=[{0x3, 0x5, 0x3, 0x7}, {0x4, 0x4, 0xf, 0xb}, {0x0, 0x3, 0xd, 0x3}, {0x1, 0x1, 0xa, 0xe}], 0x10, 0x2}, 0x90)

21:30:05 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:05 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) (async)
r1 = dup2(0xffffffffffffffff, r0) (async)
r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x3, 0x10040) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r3, r4) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r5, r6) (async)
write$eventfd(r6, &(0x7f0000000340), 0x8) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2d, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xc7b}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x672}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @printk={@d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x7f, 0x2, 0x3, 0x2, 0x6}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0x28, &(0x7f0000000280)=""/40, 0x40f00, 0x61, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x10, 0x1, 0x80000000}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000340)=[r1, r6], &(0x7f0000000380)=[{0x3, 0x5, 0x3, 0x7}, {0x4, 0x4, 0xf, 0xb}, {0x0, 0x3, 0xd, 0x3}, {0x1, 0x1, 0xa, 0xe}], 0x10, 0x2}, 0x90)

21:30:05 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:05 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000})
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3)
ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080))
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

[  231.416796][ T7085] blktrace: Concurrent blktraces are not allowed on loop3
[  231.475970][ T7096] blktrace: Concurrent blktraces are not allowed on loop3
21:30:06 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:06 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454da, 0x0)

21:30:06 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, 0x0)
dup2(r0, r1)

21:30:06 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:06 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) (async)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect)
r1 = dup2(0xffffffffffffffff, r0)
r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x3, 0x10040)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r3, r4)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r5, r6) (async)
dup2(r5, r6)
write$eventfd(r6, &(0x7f0000000340), 0x8)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2d, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xc7b}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x672}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @printk={@d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x7f, 0x2, 0x3, 0x2, 0x6}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0x28, &(0x7f0000000280)=""/40, 0x40f00, 0x61, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x10, 0x1, 0x80000000}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000340)=[r1, r6], &(0x7f0000000380)=[{0x3, 0x5, 0x3, 0x7}, {0x4, 0x4, 0xf, 0xb}, {0x0, 0x3, 0xd, 0x3}, {0x1, 0x1, 0xa, 0xe}], 0x10, 0x2}, 0x90)

21:30:06 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000}) (async, rerun: 64)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3) (async)
ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080))
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:06 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, 0x0)
dup2(r0, r1)

21:30:06 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6, 0x0)
dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x1f, 0xc, 0x7, 0xe8ee, 0xeb, 0x7, &(0x7f0000000080)="acf53ed4682f3943a9f4a4ca28f444198949304eec532b186edad6d2bc3b727ffe08b77f1a0ee783bd16996b6c4613b09f7c73ebff8a511582dd99e101558b050c3875e646e5edecf55af2319a2868415be7a779c5205267f90422c1314dabd5d15aee77e98651ba5ae37b28913773da73a9460412df8cf3c7cf7ac58e6f7719405a9e48be6c83d180bff0a5ede0e79e5ecf57b282d0c0ab6e07c66f91f4ebadc4d436e4c9b057484ee5d10e8a116b86166d0ccee26c19b2838099ea47a554411576e646f88bae779cc4c48a098a4f694632e3be905a90f8161431e41ba41e8dc622eafd8527e167171a27"})
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0)
r3 = socket$rxrpc(0x21, 0x2, 0xa)
r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff)
sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0)
sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0)

21:30:06 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:06 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454dc, 0x0)

21:30:06 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000})
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3)
ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080))
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) (async)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) (async)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x2000}) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
dup2(r2, r3) (async)
ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080)) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)

[  232.276119][ T7114] blktrace: Concurrent blktraces are not allowed on loop3
21:30:06 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, 0x0)
dup2(r0, r1)

[  232.356297][ T7128] blktrace: Concurrent blktraces are not allowed on loop3
21:30:07 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(0x0, 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:07 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454de, 0x0)

21:30:07 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6, 0x0)
dup2(0xffffffffffffffff, r0) (async)
ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x1f, 0xc, 0x7, 0xe8ee, 0xeb, 0x7, &(0x7f0000000080)="acf53ed4682f3943a9f4a4ca28f444198949304eec532b186edad6d2bc3b727ffe08b77f1a0ee783bd16996b6c4613b09f7c73ebff8a511582dd99e101558b050c3875e646e5edecf55af2319a2868415be7a779c5205267f90422c1314dabd5d15aee77e98651ba5ae37b28913773da73a9460412df8cf3c7cf7ac58e6f7719405a9e48be6c83d180bff0a5ede0e79e5ecf57b282d0c0ab6e07c66f91f4ebadc4d436e4c9b057484ee5d10e8a116b86166d0ccee26c19b2838099ea47a554411576e646f88bae779cc4c48a098a4f694632e3be905a90f8161431e41ba41e8dc622eafd8527e167171a27"}) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) (async)
r3 = socket$rxrpc(0x21, 0x2, 0xa) (async)
r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff)
sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) (async)
sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0)

21:30:07 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'gre0\x00', 0x400})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x325)

21:30:07 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:07 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x0, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:07 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(0x0, 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:07 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6, 0x0)
dup2(0xffffffffffffffff, r0)
ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x1f, 0xc, 0x7, 0xe8ee, 0xeb, 0x7, &(0x7f0000000080)="acf53ed4682f3943a9f4a4ca28f444198949304eec532b186edad6d2bc3b727ffe08b77f1a0ee783bd16996b6c4613b09f7c73ebff8a511582dd99e101558b050c3875e646e5edecf55af2319a2868415be7a779c5205267f90422c1314dabd5d15aee77e98651ba5ae37b28913773da73a9460412df8cf3c7cf7ac58e6f7719405a9e48be6c83d180bff0a5ede0e79e5ecf57b282d0c0ab6e07c66f91f4ebadc4d436e4c9b057484ee5d10e8a116b86166d0ccee26c19b2838099ea47a554411576e646f88bae779cc4c48a098a4f694632e3be905a90f8161431e41ba41e8dc622eafd8527e167171a27"}) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0)
r3 = socket$rxrpc(0x21, 0x2, 0xa) (async)
r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff)
sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) (async)
sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0)

21:30:07 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x0, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:07 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454e2, 0x0)

21:30:07 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0)
setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3})
ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100))
dup2(0xffffffffffffffff, r1)

21:30:07 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'gre0\x00', 0x400})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x325)

21:30:07 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(0x0, 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:07 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x0, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:07 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x40049409, 0x0)

21:30:07 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0)
setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3})
ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100))
dup2(0xffffffffffffffff, r1)
openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0) (async)
setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4) (async)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3}) (async)
ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100)) (async)
dup2(0xffffffffffffffff, r1) (async)

21:30:08 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:08 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x40086602, 0x0)

21:30:08 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'gre0\x00', 0x400})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x325)

21:30:08 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x280200, 0x0)
setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x400, 0x4) (async)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000140)=@usbdevfs_disconnect={0x3})
ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000100))
dup2(0xffffffffffffffff, r1)

21:30:08 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(r0, r1)

21:30:08 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:08 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:08 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x108)
write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "0f45595445ebd9744a786b3da55149333c2e2a61f72939ffdbd57bb992a7370bd650d51e9bb23ff4ea28614fe1b03615eb9115"}, 0x37)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:08 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:08 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x7a05, 0x1700)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup2(r3, r4)
write$eventfd(r3, &(0x7f0000000340), 0x8)
ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000100))
dup2(0xffffffffffffffff, r0)

21:30:08 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(r0, r1)

21:30:08 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x40087602, 0x0)

21:30:09 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:09 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(0x0, 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:09 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(0xffffffffffffffff, r0)

21:30:09 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x7a05, 0x1700) (async)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup2(r3, r4) (async)
write$eventfd(r3, &(0x7f0000000340), 0x8)
ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000100)) (async)
dup2(0xffffffffffffffff, r0)

21:30:09 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x108) (async)
write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "0f45595445ebd9744a786b3da55149333c2e2a61f72939ffdbd57bb992a7370bd650d51e9bb23ff4ea28614fe1b03615eb9115"}, 0x37) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:09 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x401054d5, 0x0)

[  234.812018][   T27] kauditd_printk_skb: 580 callbacks suppressed
[  234.812031][   T27] audit: type=1326 audit(1702503009.132:11379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  234.842299][   T27] audit: type=1326 audit(1702503009.132:11380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  234.866391][   T27] audit: type=1326 audit(1702503009.132:11381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:09 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(0x0, 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:09 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(0x0, 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:09 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x7a05, 0x1700)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup2(r3, r4) (async)
write$eventfd(r3, &(0x7f0000000340), 0x8) (async)
ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000100)) (async, rerun: 64)
dup2(0xffffffffffffffff, r0) (rerun: 64)

[  234.890368][   T27] audit: type=1326 audit(1702503009.132:11382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  234.914551][   T27] audit: type=1326 audit(1702503009.132:11383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  234.938563][   T27] audit: type=1326 audit(1702503009.132:11384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:09 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:09 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0)
ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r0})

[  234.962731][   T27] audit: type=1326 audit(1702503009.132:11385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  234.986807][   T27] audit: type=1326 audit(1702503009.132:11386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  235.011096][   T27] audit: type=1326 audit(1702503009.132:11387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  235.035180][   T27] audit: type=1326 audit(1702503009.132:11388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:09 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0) (async)
ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r0})

[  235.036585][ T7242] blktrace: Concurrent blktraces are not allowed on loop3
21:30:09 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:09 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(0xffffffffffffffff, r0)

21:30:09 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:09 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async, rerun: 32)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x108) (async, rerun: 32)
write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "0f45595445ebd9744a786b3da55149333c2e2a61f72939ffdbd57bb992a7370bd650d51e9bb23ff4ea28614fe1b03615eb9115"}, 0x37) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:09 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0) (async, rerun: 32)
ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r0}) (rerun: 32)

21:30:09 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x401054d6, 0x0)

21:30:10 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(0xffffffffffffffff, r0)

21:30:10 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x401c5820, 0x0)

21:30:10 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0))
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0)
ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000001140)={0x3, 0x11, 0x2, 0x8, 0x1000, 0x5, &(0x7f0000000140)="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"})
dup2(0xffffffffffffffff, r1)
r3 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x204000)
getsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xfffffe13)

21:30:10 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:10 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x646f3efc05203221, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3)
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)})
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r4)
r5 = getgid()
syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r5, @ANYRES16=r5], 0x0, 0x4f5, &(0x7f0000000540)="$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")
r6 = getgid()
[  235.706436][ T7261] blktrace: Concurrent blktraces are not allowed on loop3
syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r6, @ANYRES16=r6], 0x1, 0x4f4, &(0x7f0000000540)="$eJzs3U9vG2kZAPBnnHhJt1mSZTksK+2yYhelK6idbNg24tAWCXGrBCr3EiVOFMWJo9hpm6hCqfgASAhBJU6cuCDxAZBQPwKqVIneESAQghYOHIBBM56ExLKbVBvblfP7Sa/nnbFnnue14/H8eTMTwLn1fkTciIixiPgoIqaK6aWixH67ZK97/uz+UlaSSNNbf0siKaZF5NVDF4vZJtqDrpq7e+uL9Xptuxivtja2qs3dvctrG4urtdXa5vz83JWFqwufLMyeSTuzdl375p9+8sNffOvab7569/e3/3Lp+1nSk8XzRTvO3NP8sZy9F4fGI2K7H8GGYKxoT0wPOxMAAE7jrYj4XER8Kd/+n4qx9tZc5ButAAAAwEhIr0/Gv5OIFAAAABhZ1/M+sEmpUvT3nYxSqVJp9+H9fLxeqjeara+sNHY2l9t9ZaejXFpZq9dmiz6101FOsvG5ogvowfjHHePzEfFmRPx46kI+Xllq1JeHffADAAAAzomLHfv//5xq7/8DAAAAI8a1mwAAAGD09dr/TwacBwAAANA/zv8DAADASPv2zZtZSQ/uf718Z3dnvXHn8nKtuV7Z2FmqLDW2tyqrjcZqfs2+jZOWV280tr4Wmzv3qq1as1Vt7u7d3mjsbLZurx27BTYAAAAwQG9+8dHTJCL2v34hL5nXsoexHjPoKwAjo/QyL/5j//IABq/Xzzww+saHnQAwPPvDTgAYtmOX+uiyUXC0886xYwa/7V9OAADA2Zr5Qvfz/9kuQHnYyQF99VLn/4GR4vw/nF8vef7/cb/yAAavbAsAzr2TbvXR8+Idpz7/n6YnLgsAAOirybwkpUpxLnAySqVKJeKN/F/9y8nKWr02GxGfjYjfTZU/k43P5XMmbg8IAAAAAAAAAAAAAAAAAAAAAAAAAKeUpkmkAAAAwEiLKP05Ke7/NTP14WTn8YHXkn9N5cOIuPuzWz+9t9hqbc9l0/9+OL31sJj+8TCOYAAAAACdDvbTD/bjAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAsPX92f+mgDDLuX78REdPd4o/HRD6ciHJEvP6PJMaPzJdExNgZxN9/EBFvd4ufZGnFdJFFZ/xSRFwYTPx30zTtGv/iGcSH8+xRtv650e37V4r382H37/94UT6t3uu/0uH6b6zH+u+NU8Z458mvqj3jP4h4Z7z7+ucgftIj/gfdFtjlTfned/f2esVPfx4x0/X3JzkWq9ra2Ko2d/cur20srtZWa5vz83NXFq4ufLIwW11Zq9eKx64xfvTur//bMek/aVve/ugRf/qE9n+YVcpHG9MZpgj25N6zt9rVcsci8viXPuj++b/9gvjZ38SXi9+B7PmZg/p+u37Ue798/F7XxIr4yz3af9Lnf6nXQjt89J0f/OGULwUABqC5u7e+WK/XtvteeZim6aBiqbyClYlXIw2VkytncWQLAAB41fx/o3/YmQAAAAAAAAAAAAAAAAAAAMD51dyNUr8vJ9YZc384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeKH/BQAA//+xGONE")
r7 = getgid()
syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYRES16=r7], 0x1, 0x4f4, &(0x7f0000000540)="$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")
r8 = memfd_secret(0x80000)
ioctl$TUNSETGROUP(r8, 0x400454ce, r7)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:10 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  235.789265][ T7272] loop4: detected capacity change from 0 to 512
[  235.802997][ T7272] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended
[  235.812119][ T7272] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem
[  235.821024][ T7272] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended
[  235.830579][ T7272] EXT4-fs error (device loop4): ext4_orphan_get:1394: inode #15: comm syz-executor.4: iget: bad extended attribute block 19
[  235.843638][ T7272] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117)
[  235.856025][ T7272] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  235.940923][ T3132] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:30:10 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(r0, 0xffffffffffffffff)

21:30:10 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(0x0, 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:10 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x4020940d, 0x0)

21:30:10 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0) (async)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) (async)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0))
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) (async)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0)
ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000001140)={0x3, 0x11, 0x2, 0x8, 0x1000, 0x5, &(0x7f0000000140)="753332a3714dbcb3598eaca2351cad491cfa8ffed8331f63a93da4ea4742eebc097922b579861e5fc77069151d5edc6791748840c149bd5ed80c87b99aa5d041e50990e5bb95ed39b3592158bdd840bfb72d682e51987ef568eb1f333a5fdadc5494e194120cf488f90ef485122b7efe53491da8aa9537a0ce0144a4b852f0b923570176f555dbea75269dea75f5d46ed220c8c85f80f766753dce851cd9705d4932715e885784b9b5a76a21379485e5ecce2639939a71ced275a948c05d78c54962bd2f1afc22836f413315267056224b134c4d7b794db9e728e13c58e83ef116890085a965dea77b1222d4f3eda9f88a13443703db3e09c1de742a863aeee7704e6c74a6c6e0bf47b067108c4ade95f0c40ad7b4e912b5f700dc6cc89842fc1e49fd42a42d11faa19b518069d4b7a7d393e3b8f32d5c7c346fdb9585eaeb34f301eb978aed04d7608236e4a1cd4ba57c4fb57b346b5cd4512bd184bcbed2ea47fc70ac7cd24faad9d08fa29139952b36d9eef7cf66a46ed8fe27d7e0c0c461f987d41291460459330e5e43d9952885ce5ee65e8290879096063199f1d4403c9dda23597b631eda58b9ee5a9bcd4da15cf6b3c475ca73e764732f028f822c408a0f01e10d0370013c1b88f21aaf3c5e5e613a915a8892ba450edcb443ee4cae1629979aff855e6fa615335da9081b100b095f4d59a55326851923445f37d898df66ffabb450a7c007ab22f7f3dd610dabd4c72ac2c1ea02975dc53cf9b6e5c93fc492fe5e73dfcbcb76b6de90aa3826659b290b080c4e3dd2b4ed59ca82254066d6a4ea900396412068beef4cc825215b9c3c5f53017bf414d87916de8372c0d8aef326c9f11eb662fece07a16908eee4d7fb48e09b36f8e87dbbd7e480f69ea5598f677eedc66cde42134435bd2756d682c8955b4fa5dd65bbc8f9e8aad60d8e5f44a2f36fca3be9b85eee723294f76a050974f1fa5986c678ec29ba75a9a2363e8bc6d169526df559f8412e0d80808aa7b7ac7644a33e0280bf41450b685fb660d730e7367207e0e2f951aa175c1ecfdef2f71bf7ebd3ad759b5037196564437d68e7a5de5e09cdef3b5bd8e51cc567059f9245251f7935b0f3e3556ba2aa706803e227e5445a44ca73ebad50d831dc8c120d77ac2cc6f4adb20fc6ce9b4eaf6621d271e6b4c94ff489e047737ab054aa0da7c6cf0c57209593452a3ab0966fc710e32533c0c3a57ce80561bc196384e386a70fdba615b63e6b969fe3652638e2199f76f196d89439fe24ab9c27c93188118295db6afadbbad7992e21f21b57c21953825f2605609ba069c7344f525d43db780d50441b67bb3d1aac441cdcf4dab2864741a43257561a7e634fa0e07b24365a2c76d82b6b1d30d901f36f7a085eb949f37b9ed74c61c398d66d9137bd9cbe5ac16fc6090e117ceb25ea53f9f9f2386d5a39d2438d9ccf361e85bbc25bf642deb219c5c37dfdf2cade0525a7d469e6ac96b6265b94bea30e9292c9010cabfa5e6ab99f8969207fb6d9f9ffee5b74261292d51cd3dc280b5c17e2dfa7580fb47b77c40d39e37339e8171f0c5a165456c2f86d8f1403438d86228b475b6a37f2d3a5103657206ab9e2bb4785592717e1e51aeea7728b6d1cfb41d809cbc261ed22abc42f688d8293c8a7d1dd8ea0d672a2862b1c8b6399a9236254424eb894216d54fe543bdddab27eed39f42801506aa5692b07a61935c2de84b53301b3ef2392217e3a8db0122dfffe59ed46390a8cb548f2e2b66d7f626697294945fcd0f3159898590393145aac42ad7b1f97023eb1ca8baab0c16dffee1dbae2bdff03662968b4c099bb7ac58aabc727f201e6bc13480587bb1c763f20d75e85b04f8c155cf139f429dc53ffe919fbf17f61e4dce295dcc17f6c627129cd3617cecd4d6b41097ea9ca49777842757d472324c0f7595ad5ceda291ece12ce34e5735fb5e69ce717e7c5c5f626e2f1c436b8c46d191ab8e96a7a2293556632947962e63a24599147b49c1f3e7de3cadc26b931e4335e08608e7e5d1662da3c22813138ae7d397193833d20f6ded35d12eab216c87847a015c2f9b8c6e0143a079d790b87f879801041bde584cc62c1eadb6be3cc8f9984b856cec7ae37d99b26231fce4b8d2190b2edbd70441991878945a10716237674bf9db99f337d21e091ffd863737a4c020ea7116cfe88ac323996d698b289ad6a0de717efd6f829d94ca8a3163741e9892030f2d84c4f411446d88d0e09d509d88f11408a9fecd656aa32af1c1f3f9d515be6cf90e84e9714212f11c006bbc67bdcc2376619ad97c7313fa319669fa97320984cd81ce9ac17f4dcb9dd46627d520e727b836905b874bbc54263bfcc84d45873d49aa2492f5f3183d4d60c4cb72fae1b90c42a9a94c6aa837ec8e560ab23169a71f197ff7afa487c98858e7075a700a78680ad7c015ea56e54e9099c1d57d66de36471a89c5bc060c590ed6c13682882cd2b02800d3acab59eccd1ee3b5eb321e4515a77deaa78b4c3f541ed144dad3d51571a687be5cad8fd3528837775c9fb7b9452b16b5bd5b90129cd18e47809b5c0472edd0c61653b49c6bb44ab2ca49a972a1dd5f682c793e1ada3ec89db6bd79e723ab2e66b5d8cd55d021e6ea13193a455e44c2e83d2cacab15bd10a29fc0ca73c90d66b51f6de2f14262f237b3b757eb12ca3595eef23408ad67ae7aefadbb5c2173dc10b9da42b46f3a353b646374ecf83521fb3663b27273fa1616195d7e0370ccc176577ff5121424e5635d87865073d6d10120ecda83fbf3fba81f2f0c390c0a9ceafdfbcdc4d6c2b588d8ec66c7da6906ec5945d33c203235507c2508f76bad7db30d42246ffb546fe5a1cc4a10ba8e64aea6084e6820030f79bec327ffbb434b3002caaec72737b5ea7d0ea5e4736edc58ecf7ceec6ae70238d38c3b3417466eb72f84ec589214799f4b9c69a4513909ef63dd11f165555c8648273614662f6701ca6e7612c3bc47d3bc92948e38ccc3a70b0fe94eb8179932d3eeb33d7d3062cc083ab2e3d2ca7d418d00e79a6c53c09a5e7cc77e19ed4993062536554aa557da607923a78cbbf0408dfedb40111585108e42ab3351cfc7be3c887c1eebb59a9cae616574766ddf2bd476568c885a3e0389588c057dc08c932f810de7eb5d4354151b1e70ede69b2da1a3ec9e0796dc0c28b989922b0e97d66000949d5835f052a8bd7c1f28f88f7ad7a96eb31c0e9370db3a9f8534b6d76ac76ad88cca53dacf46edf4dcce2ac530e355e2316fb2e2efb7cc42f7be2e9225f4e576a0bc4374c6bfc2465f762cbc7f9fa1b2725ea10c2acd2bddfb2f634afc17787f29dc521cb69abdb9df00590b37c8567c5bbbd40a1e9d069dca31a4f112a791a81624b07b10448ad34bc6ef8ef5d28b97f85883e61027984d4fc55111fddce9055a783d19d6fe0319333254a013ecaf97d8329a1d84439e840dd65549b70df7e5fefb4f8c3af94b988b5538a9dad776cdca63ae9dc7b94b0c8b3197006efcaefa2f89ff0f5d616c49de786008304a776c10b210e332465923bbd89c618adb6cf00e11d3b795e67b6df8dc604a0c39d4ed8cd28a2136b65b2fe0094f0e98c845acef7fdd74fae0c05ca3aa1a1a34e25dbb5c639b54fbbc1161f0d0c9d2d46fef9efe4bfc9de0db859129ba73a76b025bbd5119c33fde0c930e7691ab7d28a4a8992e1fdc54097ce19bd95f9f48fcc8619929a830f0b2ced925e9d20fd2ca0ae046279f07041ce93bddb501e79f6e214d761b850119681803773e22d92862720dcfbf4ec74b05a513f0df643ee06d9a469d6693822c8da40ff47e888eeae83b22c40df799abd7e2c9b157ba2e29064992861ebbbef6974ae28a5092fe7b8dc98ab44b0ac67a95f27c3edf55aed89d6fd43966734a896dca38ea63bbc2030e6570dca6c609eb43ab79f0b077d8dcef89a6ad1123a6f435d881aecfc8942e8684b5e3d9426d16cf982bdf964de87ae30f2ec23539bde0fe436cd5ca7436bd39b5f045a6a9a6ff7a16ca825fd76bf784784c8da6952808b69a6527cc28524a076ba6f915870a15d88b78a2376f112644d2035bb52cb34d2f440c76c08026fa1067a0fe538d730047a0b3b5f4149740b61fed21a5da81f6cbe92c339be3941d8453a7ee326f09c7d92a5e62ed5aef48c80424801e504af21831831f1032bf2b07d6096069b8a048b74b6ddf04c793c6b33eb77e7fd201b848ee8093e2fcbb30c097f1b8aadf36cf3b221e3e513021e44e0961731cdee0e6a23e4fcbf43067aca576752eb1a38d217760d36c1cc85bd5ffbe0d590f30d39e3ed23f77d715b18fdae76fa5a860bfe1ed71711d03f8626ef5fd52804787d034d01a94a7012d5e476782094e5c24490b426a9d3b4e3a8c76f7b11210f7b79cd935c33a866afc48e6c2e1785a9f7a4cbdef32086df42c725e83ec5933db9fb830dc33bb58bb767da9fe9a8ee2db92a1be2dffa0b020daaa5bec6e22fd51fee27ebc6912a486cde77ba0a5bedb7da26862c2517a55ee0f8aff2fe000f8f7f59ed7d46c38c4f498c807ed60ad429feab4546ef9cd5c6eaf8babf3696f33089ab95307906157b104aa5dc19384df0d86e61e9174cc4595da8c19621e1e1d3dbbf89ee74e994c512a6884664bd910b1d429f68bb62f1f203310c546ec13dbb243c00ad5876551f49ba3341112820b50a8ecbb7108838721f53ec7d97d6d8e615757472cd00bc1aff263e03870a19d8b1e0276375c4973fcb005ebb73bcb6fb196bda6c58b5500f7004d9adc789db8d701a2e084afc3fafe33c93860699e898e367e729670d0c826885af8d339c0227638b677c8f80351a6a3e150b91d5cb42c8973a0019ad57b245787e401dca3c9a6f8ee5c8586eb628be2b56bf3ed23557095bb2efd3779368e4059926ac6e91680020b77635d1e603415bf1ce9f0cc627f5337e3a87b608dec95a99c039457c2c08baaf103cb46656c5845507dbec53aa98f7db1f7cdb8682929f8106d0a0c407c3783c1c935b17697407320889acbf7710cd632281ec54f51df5e18ab504c7d94628c874633666a2988526672c89101ed625125a9f19c7673dd360f6fcb26185d982692693b0e6d01d1e6a1f999f3be6c7bf4a4b477184da4645cab622c6a7d034ec83517a8f761c942d63d48e9c19cf9aa9fe1b2b427ab00bfb3a42fd00f36ea3e186bf4078dd4b098f740f635ca17ba567d86926daf148ef4eb48d2c25bb8e86584c61a9ed613a5a0de8fa523edab8143d2242fc00d566ed4d9785d6c47b2dfbd53aa50f5956d62f09edd7eb40ab4b63832d7ab1eb5d9d6a1cfada768e397f5210155e3492b916886f1860a2691a9c1a30a575a167fcd2353d3e5f63c9a32dd11f240037213a667b42917f07e02f4361b1f683e020ab61f6f58508135ed6be23551452be56b33fedd8b51721a8355184dc58417b78b277ec3e623f9f7979e88c370e2aa66372250fff6a82d7dd863d446370de0f2776f876a565cfdd2aab5929662805ae3964870c539938786082cc0c3599dbc7cfaec0d7c86e75fdae52235d66600ea463b49a04f878d118d5e708e4185353bffc92dd724892fb197c34535bccca4d2ebd19bc484e09274ae221d5f960c5a516f9fcd23f33bbaf832dcc4ad242466d3f3bb0b8a280d49e1ebf5c5f95e2fea1b21cdbbe5bdf972174ee670fd6cb00bdfbe706c7dc7f288cb042d001178c102f0b8b45fe8f06af352bdf048a2b00f8fde45790bbfd8cfc7d329820ad89830ef777cb8a1e"})
dup2(0xffffffffffffffff, r1)
r3 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x204000)
getsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xfffffe13)

21:30:10 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:10 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x646f3efc05203221, 0x0) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 32)
dup2(r2, r3)
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r4)
r5 = getgid()
syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r5, @ANYRES16=r5], 0x0, 0x4f5, &(0x7f0000000540)="$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") (async, rerun: 64)
r6 = getgid() (rerun: 64)
syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r6, @ANYRES16=r6], 0x1, 0x4f4, &(0x7f0000000540)="$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") (async, rerun: 64)
r7 = getgid() (rerun: 64)
syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYRES16=r7], 0x1, 0x4f4, &(0x7f0000000540)="$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") (async)
r8 = memfd_secret(0x80000)
ioctl$TUNSETGROUP(r8, 0x400454ce, r7) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:10 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:10 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  236.516036][ T7277] ==================================================================
[  236.524135][ T7277] BUG: KCSAN: data-race in mas_replace_node / mas_state_walk
[  236.531519][ T7277] 
[  236.533839][ T7277] write to 0xffff88812d460d00 of 8 bytes by task 7283 on cpu 0:
[  236.541471][ T7277]  mas_replace_node+0x1b5/0x430
[  236.546585][ T7277]  mas_wr_modify+0x287c/0x37d0
[  236.551346][ T7277]  mas_wr_store_entry+0x235/0x350
[  236.556395][ T7277]  mas_store_prealloc+0x155/0x2b0
[  236.561433][ T7277]  vma_complete+0x2a0/0x650
[  236.565938][ T7277]  __split_vma+0x550/0x5d0
[  236.570441][ T7277]  do_vmi_align_munmap+0x1bf/0x970
[  236.571610][ T7288] loop4: detected capacity change from 0 to 512
[  236.575557][ T7277]  do_vmi_munmap+0x1ea/0x230
[  236.586471][ T7277]  mmap_region+0x595/0x16e0
[  236.591011][ T7277]  do_mmap+0x67e/0xa90
[  236.595349][ T7277]  vm_mmap_pgoff+0x12e/0x240
[  236.599942][ T7277]  ksys_mmap_pgoff+0x2b8/0x330
[  236.604788][ T7277]  do_syscall_64+0x44/0x110
[  236.609387][ T7277]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
[  236.615271][ T7277] 
[  236.617577][ T7277] read to 0xffff88812d460d00 of 8 bytes by task 7277 on cpu 1:
[  236.625100][ T7277]  mas_state_walk+0x267/0x5d0
[  236.629773][ T7277]  mas_walk+0x31/0x120
[  236.633831][ T7277]  lock_vma_under_rcu+0x8d/0x2a0
[  236.638754][ T7277]  exc_page_fault+0x164/0x6c0
[  236.643414][ T7277]  asm_exc_page_fault+0x26/0x30
[  236.648256][ T7277] 
[  236.650559][ T7277] value changed: 0xffff8881040acc06 -> 0xffff88812d460d00
[  236.657647][ T7277] 
[  236.659953][ T7277] Reported by Kernel Concurrency Sanitizer on:
21:30:11 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0))
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0)
ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000001140)={0x3, 0x11, 0x2, 0x8, 0x1000, 0x5, &(0x7f0000000140)="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"})
dup2(0xffffffffffffffff, r1)
r3 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x204000)
getsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xfffffe13)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) (async)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0) (async)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) (async)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) (async)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) (async)
ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000001140)={0x3, 0x11, 0x2, 0x8, 0x1000, 0x5, &(0x7f0000000140)="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"}) (async)
dup2(0xffffffffffffffff, r1) (async)
syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x204000) (async)
getsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xfffffe13) (async)

[  236.666086][ T7277] CPU: 1 PID: 7277 Comm: syz-executor.5 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
[  236.676567][ T7277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[  236.686604][ T7277] ==================================================================
21:30:11 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:11 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454cf, 0x0)

21:30:11 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:11 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(r0, 0xffffffffffffffff)

[  236.711871][ T7288] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended
[  236.720984][ T7288] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem
[  236.755167][ T7288] workqueue: Failed to create a rescuer kthread for wq "ext4-rsv-conversion": -EINTR
21:30:11 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x0, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, 0x0})
dup2(r0, 0xffffffffffffffff)

21:30:11 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x5, 0x24c3)
dup2(0xffffffffffffffff, r0)

21:30:11 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

[  236.755229][ T7288] EXT4-fs: failed to create workqueue
[  236.770170][ T7288] EXT4-fs (loop4): mount failed
[  236.776556][ T7306] blktrace: Concurrent blktraces are not allowed on loop3
21:30:11 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454d2, 0x0)

21:30:11 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x5, 0x24c3)
dup2(0xffffffffffffffff, r0)

21:30:11 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:11 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x40087602, 0x0)

21:30:11 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x646f3efc05203221, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3) (async)
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)})
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r4) (async)
r5 = getgid()
syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r5, @ANYRES16=r5], 0x0, 0x4f5, &(0x7f0000000540)="$eJzs3U9vG2kZAPBnnHhJt1mSZTksK+2yYhelK6idbNg24tAWCXGrBCr3EiVOFMWJo9hpm6hCqfgASAhBJU6cuCDxAZBQPwKqVIneESAQghYOHIBBM56ExLKbVBvblfP7Sa/nnbFnnue14/H8eTMTwLn1fkTciIixiPgoIqaK6aWixH67ZK97/uz+UlaSSNNbf0siKaZF5NVDF4vZJtqDrpq7e+uL9Xptuxivtja2qs3dvctrG4urtdXa5vz83JWFqwufLMyeSTuzdl375p9+8sNffOvab7569/e3/3Lp+1nSk8XzRTvO3NP8sZy9F4fGI2K7H8GGYKxoT0wPOxMAAE7jrYj4XER8Kd/+n4qx9tZc5ButAAAAwEhIr0/Gv5OIFAAAABhZ1/M+sEmpUvT3nYxSqVJp9+H9fLxeqjeara+sNHY2l9t9ZaejXFpZq9dmiz6101FOsvG5ogvowfjHHePzEfFmRPx46kI+Xllq1JeHffADAAAAzomLHfv//5xq7/8DAAAAI8a1mwAAAGD09dr/TwacBwAAANA/zv8DAADASPv2zZtZSQ/uf718Z3dnvXHn8nKtuV7Z2FmqLDW2tyqrjcZqfs2+jZOWV280tr4Wmzv3qq1as1Vt7u7d3mjsbLZurx27BTYAAAAwQG9+8dHTJCL2v34hL5nXsoexHjPoKwAjo/QyL/5j//IABq/Xzzww+saHnQAwPPvDTgAYtmOX+uiyUXC0886xYwa/7V9OAADA2Zr5Qvfz/9kuQHnYyQF99VLn/4GR4vw/nF8vef7/cb/yAAavbAsAzr2TbvXR8+Idpz7/n6YnLgsAAOirybwkpUpxLnAySqVKJeKN/F/9y8nKWr02GxGfjYjfTZU/k43P5XMmbg8IAAAAAAAAAAAAAAAAAAAAAAAAAKeUpkmkAAAAwEiLKP05Ke7/NTP14WTn8YHXkn9N5cOIuPuzWz+9t9hqbc9l0/9+OL31sJj+8TCOYAAAAACdDvbTD/bjAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAsPX92f+mgDDLuX78REdPd4o/HRD6ciHJEvP6PJMaPzJdExNgZxN9/EBFvd4ufZGnFdJFFZ/xSRFwYTPx30zTtGv/iGcSH8+xRtv650e37V4r382H37/94UT6t3uu/0uH6b6zH+u+NU8Z458mvqj3jP4h4Z7z7+ucgftIj/gfdFtjlTfned/f2esVPfx4x0/X3JzkWq9ra2Ko2d/cur20srtZWa5vz83NXFq4ufLIwW11Zq9eKx64xfvTur//bMek/aVve/ugRf/qE9n+YVcpHG9MZpgj25N6zt9rVcsci8viXPuj++b/9gvjZ38SXi9+B7PmZg/p+u37Ue798/F7XxIr4yz3af9Lnf6nXQjt89J0f/OGULwUABqC5u7e+WK/XtvteeZim6aBiqbyClYlXIw2VkytncWQLAAB41fx/o3/YmQAAAAAAAAAAAAAAAAAAAMD51dyNUr8vJ9YZc384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeKH/BQAA//+xGONE")
r6 = getgid()
syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r6, @ANYRES16=r6], 0x1, 0x4f4, &(0x7f0000000540)="$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") (async)
r7 = getgid()
syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYRES16=r7], 0x1, 0x4f4, &(0x7f0000000540)="$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")
r8 = memfd_secret(0x80000)
ioctl$TUNSETGROUP(r8, 0x400454ce, r7) (async, rerun: 32)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (rerun: 32)

21:30:11 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r1, 0x0, 0x8001, 0x0)

21:30:11 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x5, 0x24c3)
dup2(0xffffffffffffffff, r0)

21:30:11 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x3, 0x2000)
splice(r0, &(0x7f0000000000)=0x3, r0, &(0x7f0000000080)=0x7ff, 0x800000, 0x8)
dup2(0xffffffffffffffff, r0)

21:30:11 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x3, 0x2000) (async)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x3, 0x2000)
splice(r0, &(0x7f0000000000)=0x3, r0, &(0x7f0000000080)=0x7ff, 0x800000, 0x8)
dup2(0xffffffffffffffff, r0)

21:30:11 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:11 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x3, 0x2000)
splice(r0, &(0x7f0000000000)=0x3, r0, &(0x7f0000000080)=0x7ff, 0x800000, 0x8) (async)
dup2(0xffffffffffffffff, r0)

[  237.386228][ T7331] loop4: detected capacity change from 0 to 512
[  237.394139][ T7331] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended
[  237.403403][ T7331] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem
[  237.416704][ T7331] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended
21:30:11 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)={0x3, 0x3ab7})
r1 = dup2(0xffffffffffffffff, r0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, <r2=>r0, {0x81}}, './file0\x00'})
setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x10000, 0x4)

21:30:11 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454d3, 0x0)

21:30:11 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:11 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x400454da, 0x0)

21:30:11 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)={0x3, 0x3ab7}) (async)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, <r2=>r0, {0x81}}, './file0\x00'})
setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x10000, 0x4)

[  237.431904][ T7331] EXT4-fs error (device loop4): ext4_orphan_get:1394: inode #15: comm syz-executor.4: iget: bad extended attribute block 19
[  237.446131][ T7331] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117)
[  237.468754][ T7331] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
21:30:11 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vlan0\x00', 0x4000})

[  237.553456][ T3132] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.
21:30:12 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r1, 0x0, 0x8001, 0x0)

21:30:12 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454d7, 0x0)

21:30:12 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:12 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)={0x3, 0x3ab7})
r1 = dup2(0xffffffffffffffff, r0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, <r2=>r0, {0x81}}, './file0\x00'})
setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x10000, 0x4)

21:30:12 executing program 3:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:12 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vlan0\x00', 0x4000})
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vlan0\x00', 0x4000}) (async)

21:30:12 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0xffffffb0, 0x0, 0x3f, 0x2, 0x9, 0x0, 0xe, 0x50000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x2, @perf_config_ext={0x401, 0x1}, 0x0, 0x9, 0x4, 0x0, 0x1, 0x7, 0xf9, 0x0, 0x8, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x9)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000700018000000000", @ANYRES32=<r1=>r0, @ANYBLOB="02000000000000002e2f66696c653000"])
dup2(0xffffffffffffffff, r1)

21:30:12 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:12 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:12 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454dd, 0x0)

21:30:12 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vlan0\x00', 0x4000})

[  238.258534][ T7367] blktrace: Concurrent blktraces are not allowed on loop7
21:30:12 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0xffffffb0, 0x0, 0x3f, 0x2, 0x9, 0x0, 0xe, 0x50000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x2, @perf_config_ext={0x401, 0x1}, 0x0, 0x9, 0x4, 0x0, 0x1, 0x7, 0xf9, 0x0, 0x8, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x9) (async)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000700018000000000", @ANYRES32=<r1=>r0, @ANYBLOB="02000000000000002e2f66696c653000"])
dup2(0xffffffffffffffff, r1)

[  238.320556][ T7381] blktrace: Concurrent blktraces are not allowed on loop7
21:30:13 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:13 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r1, 0x0, 0x8001, 0x0)

21:30:13 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454df, 0x0)

21:30:13 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0xffffffb0, 0x0, 0x3f, 0x2, 0x9, 0x0, 0xe, 0x50000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x2, @perf_config_ext={0x401, 0x1}, 0x0, 0x9, 0x4, 0x0, 0x1, 0x7, 0xf9, 0x0, 0x8, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x9)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000700018000000000", @ANYRES32=<r1=>r0, @ANYBLOB="02000000000000002e2f66696c653000"])
dup2(0xffffffffffffffff, r1)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
perf_event_open(&(0x7f0000000080)={0x2, 0xffffffb0, 0x0, 0x3f, 0x2, 0x9, 0x0, 0xe, 0x50000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x2, @perf_config_ext={0x401, 0x1}, 0x0, 0x9, 0x4, 0x0, 0x1, 0x7, 0xf9, 0x0, 0x8, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x9) (async)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000700018000000000", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c653000"]) (async)
dup2(0xffffffffffffffff, r1) (async)

21:30:13 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth1_macvtap\x00', 0x1})
syncfs(r0)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
close(r1)
r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0)
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={<r3=>0x0, 0x100000000, 0x8})
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000480)={<r4=>r3, 0x5, 0x6})
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
dup2(r5, 0xffffffffffffffff)
ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000008c0)={0xfffffffffffffffa, 0x40, [0x0, 0x8, 0x4, 0x4], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000c00)={<r6=>r4, 0x0, 0x0, 0x1})
ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000001000)={r6, 0x7, 0x40, 0x1})

21:30:13 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(r0, r1)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:13 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth1_macvtap\x00', 0x1})
syncfs(r0)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
close(r1)
r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0)
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={<r3=>0x0, 0x100000000, 0x8})
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000480)={<r4=>r3, 0x5, 0x6})
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
dup2(r5, 0xffffffffffffffff)
ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000008c0)={0xfffffffffffffffa, 0x40, [0x0, 0x8, 0x4, 0x4], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000c00)={<r6=>r4, 0x0, 0x0, 0x1})
ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000001000)={r6, 0x7, 0x40, 0x1})
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth1_macvtap\x00', 0x1}) (async)
syncfs(r0) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) (async)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) (async)
close(r1) (async)
openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0) (async)
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x100000000, 0x8}) (async)
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000480)={r3, 0x5, 0x6}) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
dup2(r5, 0xffffffffffffffff) (async)
ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000008c0)={0xfffffffffffffffa, 0x40, [0x0, 0x8, 0x4, 0x4], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async)
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000c00)={r4, 0x0, 0x0, 0x1}) (async)
ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000001000)={r6, 0x7, 0x40, 0x1}) (async)

21:30:13 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth1_macvtap\x00', 0x1})
syncfs(r0) (async)
syncfs(r0)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
close(r1)
r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0)
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={<r3=>0x0, 0x100000000, 0x8})
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000480)={r3, 0x5, 0x6}) (async)
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000480)={<r4=>r3, 0x5, 0x6})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
dup2(r5, 0xffffffffffffffff)
ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000008c0)={0xfffffffffffffffa, 0x40, [0x0, 0x8, 0x4, 0x4], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000c00)={r4, 0x0, 0x0, 0x1}) (async)
ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000c00)={<r6=>r4, 0x0, 0x0, 0x1})
ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000001000)={r6, 0x7, 0x40, 0x1})

21:30:13 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2)
write$eventfd(r2, &(0x7f0000000340), 0x8)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x1)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:13 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454e0, 0x0)

21:30:13 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(r0, r1)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:13 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
r2 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80010, r2, 0xa2ef7000)

21:30:13 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, 0x0, 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:14 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) (async)
r2 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80010, r2, 0xa2ef7000)

21:30:14 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2)
write$eventfd(r2, &(0x7f0000000340), 0x8)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x1)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
dup2(r1, r2) (async)
write$eventfd(r2, &(0x7f0000000340), 0x8) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x1) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)

21:30:14 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(r0, r1)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:14 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x800454e1, 0x0)

21:30:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, 0x0, 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:14 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, 0x0, 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x8001, 0x0)

21:30:14 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0)

21:30:14 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
r2 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0)
mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80010, r2, 0xa2ef7000)

21:30:14 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:14 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x80086601, 0x0)

21:30:14 executing program 2:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8001, 0x0)

21:30:14 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2) (async)
dup2(r1, r2)
write$eventfd(r2, &(0x7f0000000340), 0x8)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x1) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x1)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

[  240.010921][   T27] kauditd_printk_skb: 257 callbacks suppressed
[  240.010934][   T27] audit: type=1326 audit(1702503014.332:11646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:14 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0)

21:30:14 executing program 5:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, <r0=>0x0}, &(0x7f0000000080)=0xc)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(0xffffffffffffffff, r1)
ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000100)={'wlan1\x00'})
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r3, r4)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r5, 0x0)
sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYRES16=r5, @ANYRESHEX=r2, @ANYBLOB="000427bd00", @ANYRES16=r0, @ANYBLOB="0500180112000000080057000100000008002201a200000005001801160000000800a000bd000000050018012200000008002201ea0100000800a00000040000"], 0x5c}, 0x1, 0x0, 0x0, 0x24004010}, 0x4040000)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r6, r7)
r8 = getpid()
sched_setscheduler(r8, 0x3, 0x0)
sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x4)
fcntl$setown(r6, 0x8, r8)

[  240.041312][   T27] audit: type=1326 audit(1702503014.342:11647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  240.065322][   T27] audit: type=1326 audit(1702503014.342:11648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:14 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="0000004000000000735569f5ddd8256066a8480100010000000000ffffffff000000000400000000000000080000000000000402000000000000000100000000000000ff0300000000872c680000f979c6cfb0116042dc785905000000000000000095aa4178f513d0f98dc15fae81e0c98362dae5ca0d5a61b79710b17e3ea1591304080cb7b4189a04bd78d75e36fe47bf70ca7d8500289b17dde1ebe094e06a85c89e960543a6739eb0199dd7693572801bb9616372051f2638e1a627d44c6f73247f0a87984ad91e969a4aba6ce05d2e5b5736ae2dbe7c2fe5261662bd93b4259a1940d21a9dbe42a54870b62899a9a158764fe43da9773b7b0c26f49ba0d7674bec586ae67837690abe1d00079572915e77e7fe22f07e2bf7941c5bd1a65128853e688f6271cda06a0ab9bfd0dd1b15edf330d5dc22126e71ed068f3fbcedae2a9bb45bbc7098cdd8d7c9db30fb0fa2ae8ed5e4c1f8818d01bdd3aa0613961f441a7507d7a635b4344c838b991131630216bbb8d2f6a05528550f1af31dc3fa1742da8de84abba90f119019bcbfca2fb85885d2999e93f4c7b5253a2841d0bfb93e65e32b701c65c285ae77e42471bf2482092e95f223c3821c637b68b09d19cda8ae0d80f6bd01eec09420ae3b5236a948ff380885a7"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:14 executing program 5:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) (async)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, <r0=>0x0}, &(0x7f0000000080)=0xc)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r1) (async)
r2 = dup2(0xffffffffffffffff, r1)
ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000100)={'wlan1\x00'})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r3, r4)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r5, 0x0) (async)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r5, 0x0)
sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYRES16=r5, @ANYRESHEX=r2, @ANYBLOB="000427bd00", @ANYRES16=r0, @ANYBLOB="0500180112000000080057000100000008002201a200000005001801160000000800a000bd000000050018012200000008002201ea0100000800a00000040000"], 0x5c}, 0x1, 0x0, 0x0, 0x24004010}, 0x4040000)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r6, r7)
r8 = getpid()
sched_setscheduler(r8, 0x3, 0x0)
sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x4)
fcntl$setown(r6, 0x8, r8)

[  240.089437][   T27] audit: type=1326 audit(1702503014.342:11649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  240.113497][   T27] audit: type=1326 audit(1702503014.342:11650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  240.137522][   T27] audit: type=1326 audit(1702503014.342:11651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  240.161537][   T27] audit: type=1326 audit(1702503014.342:11652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  240.185571][   T27] audit: type=1326 audit(1702503014.342:11653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:14 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0)

[  240.209748][   T27] audit: type=1326 audit(1702503014.342:11654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  240.233814][   T27] audit: type=1326 audit(1702503014.342:11655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7447 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:14 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x0, 0x10000, 0x4})

21:30:14 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:14 executing program 5:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, <r0=>0x0}, &(0x7f0000000080)=0xc) (async)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(0xffffffffffffffff, r1)
ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000100)={'wlan1\x00'})
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r3, r4) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r5, 0x0) (async)
sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYRES16=r5, @ANYRESHEX=r2, @ANYBLOB="000427bd00", @ANYRES16=r0, @ANYBLOB="0500180112000000080057000100000008002201a200000005001801160000000800a000bd000000050018012200000008002201ea0100000800a00000040000"], 0x5c}, 0x1, 0x0, 0x0, 0x24004010}, 0x4040000) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r6, r7) (async)
r8 = getpid()
sched_setscheduler(r8, 0x3, 0x0)
sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x4)
fcntl$setown(r6, 0x8, r8)

21:30:14 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x80087601, 0x0)

21:30:14 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
r1 = syz_io_uring_complete(0x0)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3)
ioctl$TUNSETLINK(r2, 0x400454cd, 0x104)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x8, 0x2, 0x7e387f5f, 0xff800, 0x7ff})

[  240.276828][ T7469] blktrace: Concurrent blktraces are not allowed on loop7
[  240.336852][ T7477] blktrace: Concurrent blktraces are not allowed on loop7
21:30:15 executing program 5:
process_mrelease(0xffffffffffffffff, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0x3})
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="0100d0c58318d9d8a3600000", @ANYRES32=<r1=>r0, @ANYBLOB="55ffffff000000002e2f66696c653000"])
ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000140)={{{0x8, 0x1}}, 0x49, 0x0, &(0x7f00000000c0)="780f0cab7dac6387be9ce1b277b21de000e993ec01efed4c2ada48e8e6ee78481951fa51521b6a04155366575890ac5f5a4d3bf3f05e400e656feae08356a66f84268e6d8d94f5f17c"})
r2 = dup2(0xffffffffffffffff, r0)
r3 = dup2(r2, r0)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=<r4=>0x0)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={r2, r3, 0x26, 0x0, @val=@uprobe_multi={&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=[0x7, 0x2, 0x0, 0xab35], 0x0, 0x7f, 0x4, 0x1, r4}}, 0x40)

21:30:15 executing program 2:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8001, 0x0)

21:30:15 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x0, 0x0, 0x4})

21:30:15 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x801054db, 0x0)

21:30:15 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
r1 = syz_io_uring_complete(0x0)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3) (async)
ioctl$TUNSETLINK(r2, 0x400454cd, 0x104) (async)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x8, 0x2, 0x7e387f5f, 0xff800, 0x7ff})

21:30:15 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
dup2(r0, r1)

21:30:15 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000018c0))

21:30:15 executing program 5:
process_mrelease(0xffffffffffffffff, 0x0) (async)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0x3}) (async, rerun: 64)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="0100d0c58318d9d8a3600000", @ANYRES32=<r1=>r0, @ANYBLOB="55ffffff000000002e2f66696c653000"]) (rerun: 64)
ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000140)={{{0x8, 0x1}}, 0x49, 0x0, &(0x7f00000000c0)="780f0cab7dac6387be9ce1b277b21de000e993ec01efed4c2ada48e8e6ee78481951fa51521b6a04155366575890ac5f5a4d3bf3f05e400e656feae08356a66f84268e6d8d94f5f17c"}) (async, rerun: 64)
r2 = dup2(0xffffffffffffffff, r0) (rerun: 64)
r3 = dup2(r2, r0) (async)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=<r4=>0x0)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={r2, r3, 0x26, 0x0, @val=@uprobe_multi={&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=[0x7, 0x2, 0x0, 0xab35], 0x0, 0x7f, 0x4, 0x1, r4}}, 0x40)

21:30:15 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x801c581f, 0x0)

21:30:15 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
dup2(r0, r1)

21:30:15 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
r1 = syz_io_uring_complete(0x0)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3)
ioctl$TUNSETLINK(r2, 0x400454cd, 0x104)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x8, 0x2, 0x7e387f5f, 0xff800, 0x7ff})
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
syz_io_uring_complete(0x0) (async)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
dup2(r2, r3) (async)
ioctl$TUNSETLINK(r2, 0x400454cd, 0x104) (async)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x8, 0x2, 0x7e387f5f, 0xff800, 0x7ff}) (async)

21:30:15 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0xc0045878, 0x0)

21:30:15 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0)

21:30:16 executing program 2:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8001, 0x0)

21:30:16 executing program 5:
process_mrelease(0xffffffffffffffff, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0x3}) (async)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="0100d0c58318d9d8a3600000", @ANYRES32=<r1=>r0, @ANYBLOB="55ffffff000000002e2f66696c653000"])
ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000140)={{{0x8, 0x1}}, 0x49, 0x0, &(0x7f00000000c0)="780f0cab7dac6387be9ce1b277b21de000e993ec01efed4c2ada48e8e6ee78481951fa51521b6a04155366575890ac5f5a4d3bf3f05e400e656feae08356a66f84268e6d8d94f5f17c"}) (async)
r2 = dup2(0xffffffffffffffff, r0)
r3 = dup2(r2, r0) (async)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=<r4=>0x0)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={r2, r3, 0x26, 0x0, @val=@uprobe_multi={&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=[0x7, 0x2, 0x0, 0xab35], 0x0, 0x7f, 0x4, 0x1, r4}}, 0x40)

21:30:16 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x7fff, 0x5bc66731, 0x4, 0x1180, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xb}, 0x48)

21:30:16 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})

21:30:16 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0)

21:30:16 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0xc0045878, 0x0)

21:30:16 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r0 = inotify_init1(0x0)
dup2(0xffffffffffffffff, r0)

21:30:16 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0xc0189436, 0x0)

21:30:16 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x7fff, 0x5bc66731, 0x4, 0x1180, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xb}, 0x48)

21:30:16 executing program 1:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8001, 0x0)

21:30:16 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r0 = inotify_init1(0x0)
dup2(0xffffffffffffffff, r0)

21:30:16 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})

21:30:16 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0)

21:30:16 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0xc020660b, 0x0)

21:30:16 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})

21:30:16 executing program 5:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r0 = inotify_init1(0x0)
dup2(0xffffffffffffffff, r0)

21:30:16 executing program 4:
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x7fff, 0x5bc66731, 0x4, 0x1180, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xb}, 0x48)

21:30:16 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x2)

21:30:16 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1)

21:30:16 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xf)

21:30:17 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) (async)
ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1)

21:30:17 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x4)

21:30:17 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:17 executing program 1:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r2 = dup2(r0, r1)
ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0)

21:30:17 executing program 1:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x18000000)
dup2(0xffffffffffffffff, r0)

21:30:17 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xf)

21:30:17 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x1000000)

21:30:17 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:17 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0)

21:30:17 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1)

21:30:17 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
r2 = syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000100)={{}, 0x0, 0x0, @inherit={0x50, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, <r4=>0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{r2}, 0x0, 0x8, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r4})
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000006c0)={{r1}, 0x0, 0x0, @inherit={0x98, &(0x7f0000000600)=ANY=[@ANYRESOCT]}, @subvolid=0x3})
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x518, 0x3a0, 0x0, 0x198, 0x3a0, 0x0, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback={0x6200000000000000}, @mcast2, [], [], 'syzkaller1\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5d6954d77e6a21161d9c269dfa61b4186476f88191f8b18d04fd58839b0f"}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578)
r5 = dup2(r0, r3)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000018c0)={'\x00', 0x0, 0x2, 0x10000, 0x4})

21:30:17 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:17 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb1, 0x0)
dup2(0xffffffffffffffff, r0)

21:30:17 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xf)

21:30:17 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb1, 0x0)
dup2(0xffffffffffffffff, r0)
syz_open_dev$usbfs(&(0x7f0000000040), 0xb1, 0x0) (async)
dup2(0xffffffffffffffff, r0) (async)

21:30:17 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x2000000)

21:30:17 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb1, 0x0)
dup2(0xffffffffffffffff, r0) (async)
dup2(0xffffffffffffffff, r0)

21:30:17 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x101040, 0x0)
lseek(r1, 0x2, 0x2)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3)
getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140), 0x10)
write$eventfd(r3, &(0x7f0000000340), 0x8)
fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x3)

21:30:17 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(&(0x7f0000000040)='./file0\x00', 0x10100, 0xc4)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:17 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0) (async)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x101040, 0x0)
lseek(r1, 0x2, 0x2) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3) (async)
getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140), 0x10)
write$eventfd(r3, &(0x7f0000000340), 0x8)
fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x3)

[  243.584822][ T7601] blktrace: Concurrent blktraces are not allowed on loop3
21:30:18 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0)

21:30:18 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x800})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'wg0\x00', 0x1000})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:18 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
r0 = creat(&(0x7f0000000080)='./file0\x00', 0xc5)
open(0x0, 0x10100, 0xc4)
inotify_init1(0x0)
syz_open_dev$usbfs(&(0x7f00000017c0), 0x2000000, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000003080)={"41e00553df175b74071729f5a119a6f5", 0x0, 0x0, {0x4, 0x6}, {0x4, 0x6}, 0xfff9, [0x0, 0x1000095, 0x2, 0x2, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0xe801, 0x10001, 0x200, 0x7, 0xffffffffffff8000, 0x8, 0x7, 0x5]})
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000001840)={0x4000, 0xfffffffd}, 0x10)
ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0x80805513, &(0x7f00000000c0)})
dup2(r0, r1)

21:30:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0x4000000)

21:30:18 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
dup2(0xffffffffffffffff, r0)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x101040, 0x0)
lseek(r1, 0x2, 0x2)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r2, r3)
getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140), 0x10)
write$eventfd(r3, &(0x7f0000000340), 0x8)
fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x3)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
dup2(0xffffffffffffffff, r0) (async)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x101040, 0x0) (async)
lseek(r1, 0x2, 0x2) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
dup2(r2, r3) (async)
getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140), 0x10) (async)
write$eventfd(r3, &(0x7f0000000340), 0x8) (async)
fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x3) (async)

21:30:18 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:18 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x800})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'wg0\x00', 0x1000})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:18 executing program 4:
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x800})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'wg0\x00', 0x1000})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)

21:30:18 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x480802, 0x0)
preadv2(r1, &(0x7f0000000500)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f00000000c0)=""/244, 0xf4}, {&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f00000002c0)=""/159, 0x9f}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/96, 0x60}], 0x8, 0x2, 0x3, 0x2)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'team_slave_1\x00', 0x400})

21:30:18 executing program 1:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001)
dup2(0xffffffffffffffff, r0)

21:30:18 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:18 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0xf5ffffff)

21:30:19 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x480802, 0x0)
preadv2(r1, &(0x7f0000000500)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f00000000c0)=""/244, 0xf4}, {&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f00000002c0)=""/159, 0x9f}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/96, 0x60}], 0x8, 0x2, 0x3, 0x2) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'team_slave_1\x00', 0x400})

21:30:19 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2)
write$eventfd(r2, &(0x7f0000000340), 0x8)
ioctl$USBDEVFS_ALLOC_STREAMS(r2, 0x8008551c, &(0x7f0000000000)={0x2996, 0x8, [{0xd, 0x1}, {0xf}, {0xa, 0x1}, {0xc, 0x1}, {0x1, 0x1}, {0xc}, {0x0, 0x1}, {0x1}]})
dup2(0xffffffffffffffff, r0)

21:30:19 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
creat(&(0x7f0000000080)='./file0\x00', 0xc5)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:19 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETLINK(r0, 0x54e3, 0xfeffffff)

21:30:19 executing program 1:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001)
dup2(0xffffffffffffffff, r0)

21:30:19 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x1}]}}}]}, 0x44}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x0, 0x0)

[  245.156309][   T27] kauditd_printk_skb: 498 callbacks suppressed
[  245.156319][   T27] audit: type=1326 audit(1702503019.482:12154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  245.186808][   T27] audit: type=1326 audit(1702503019.482:12155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  245.210926][   T27] audit: type=1326 audit(1702503019.482:12156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:19 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
truncate(&(0x7f0000001700)='./file0\x00', 0x1)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

21:30:19 executing program 1:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001)
dup2(0xffffffffffffffff, r0)

21:30:19 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 32)
dup2(r1, r2)
write$eventfd(r2, &(0x7f0000000340), 0x8) (async)
ioctl$USBDEVFS_ALLOC_STREAMS(r2, 0x8008551c, &(0x7f0000000000)={0x2996, 0x8, [{0xd, 0x1}, {0xf}, {0xa, 0x1}, {0xc, 0x1}, {0x1, 0x1}, {0xc}, {0x0, 0x1}, {0x1}]}) (async)
dup2(0xffffffffffffffff, r0)

[  245.234834][   T27] audit: type=1326 audit(1702503019.482:12157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  245.258841][   T27] audit: type=1326 audit(1702503019.482:12158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  245.282871][   T27] audit: type=1326 audit(1702503019.482:12159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:19 executing program 1:
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x4001)

[  245.306942][   T27] audit: type=1326 audit(1702503019.482:12160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  245.330947][   T27] audit: type=1326 audit(1702503019.482:12161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:19 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
dup2(r1, r2) (async)
write$eventfd(r2, &(0x7f0000000340), 0x8)
ioctl$USBDEVFS_ALLOC_STREAMS(r2, 0x8008551c, &(0x7f0000000000)={0x2996, 0x8, [{0xd, 0x1}, {0xf}, {0xa, 0x1}, {0xc, 0x1}, {0x1, 0x1}, {0xc}, {0x0, 0x1}, {0x1}]}) (async)
dup2(0xffffffffffffffff, r0)

21:30:19 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]})
shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0, 0x9, 0x53, 0x9}, {0xa23, 0x4, 0x9, 0x1}, {0x0, 0x4f, 0x5, 0x401}, {0x6, 0x7, 0x0, 0x1}]})
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
socket$inet(0x2b, 0x801, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100000000000600d, 0x1)
syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801)

[  245.355045][   T27] audit: type=1326 audit(1702503019.482:12162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
[  245.379100][   T27] audit: type=1326 audit(1702503019.482:12163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7655 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc1c3b5dba9 code=0x7ffc0000
21:30:19 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1})
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x480802, 0x0)
preadv2(r1, &(0x7f0000000500)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f00000000c0)=""/244, 0xf4}, {&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f00000002c0)=""/159, 0x9f}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/96, 0x60}], 0x8, 0x2, 0x3, 0x2)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'team_slave_1\x00', 0x400})
openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg0\x00', 0x1}) (async)
ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) (async)
openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x480802, 0x0) (async)
preadv2(r1, &(0x7f0000000500)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f00000000c0)=""/244, 0xf4}, {&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f00000002c0)=""/159, 0x9f}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/96, 0x60}], 0x8, 0x2, 0x3, 0x2) (async)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) (async)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'team_slave_1\x00', 0x400}) (async)

21:30:19 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, <r1=>r0, {0x5}}, './file0\x00'})
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0)
sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xdc, r2, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x83b, 0x47}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x5f8000}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MESH_SETUP={0xa8, 0x70, [@NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0x7f}, @NL80211_MESH_SETUP_IE={0x99, 0x3, "fb3526