getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00', 0x0, [0x0, 0x6, 0x0, 0x40, 0x4]}, &(0x7f0000000000)=0x54) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'local', '', @void}}}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r1 = creat(&(0x7f0000001680)='./file0/file0\x00', 0x0) pwrite64(r1, &(0x7f0000000140)="b2", 0x20000141, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x4, 0x0, 0x0, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x9}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) fsmount(0xffffffffffffffff, 0x0, 0x82)