ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000000)={"2330d4c99962fd4df2fc8161a41a666b", 0x0, 0x0, {0x0, 0xfffffffd}, {0x0, 0x2}, 0x8001, [0x3, 0x1, 0x14, 0x1, 0x8, 0x2, 0xb31c, 0x20, 0x3, 0x0, 0x6, 0x0, 0x0, 0x7, 0x200000002000000, 0x2]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup2(r0, r0) ioctl$FIOCLEX(r1, 0x5451) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x400181, 0x0) clone3(&(0x7f0000000500)={0x100000000, &(0x7f0000000200), 0x0, &(0x7f0000000280), {}, &(0x7f00000002c0)=""/246, 0xf6, &(0x7f00000003c0)=""/194, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/crypto\x00', 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000740), 0x3, 0x109000) syz_genetlink_get_family_id$team(0x0, r3)