perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x89, &(0x7f0000000740)={@local, @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x0, 0x8, 0x0, @opaque="5c25ad596728f7dcb27b87352defa49c41126cbccb9872b6ecddc3771b74097af9cd2bd0e04668cc794b0887d80dd2643c4c36069e6fd802624af6b294ab32e2c99a5bfe9c4c548a14726aea46086807f4e012df15a4f18e27946514e80b29"}}}}}, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x1418c3) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000"], 0x14}}, 0x0) clone3(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="fd89646e6f2d27900d52225683", @ANYBLOB="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"]) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000600)={"f41a7888f301bf89536301fd475fe6a0", 0x0, 0x0, {0x800, 0x4}, {0x9, 0x8}, 0x8, [0x8, 0x3, 0x4, 0x401, 0x0, 0x3ed, 0x1f, 0x2, 0x2, 0x1ff, 0x0, 0x3, 0xb655, 0x6, 0x1000, 0xe4]}) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000004, 0x11, r1, 0x10000000) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000380)='jfs\x00', 0x2041, 0x0) socket$inet6_udp(0xa, 0x2, 0x0)