mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x9e, 0x4a4043) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000340)=[{&(0x7f00000006c0)="f17271729ba23c2ed981d6fe3efb7e3dadb1169d67916669aca51454265ba737426ebda94b13eceeebca1c0afe471a7b7cd253e21eb3b6a0a1a5306a59304d7770a8e064db03a0b62b103ff5c005ce38215e94ed618d89204ff60331793d763bfafd4061182e479724841273e0e239c94a70d20ee758903d96438b70265b69fbb7e9bb8dbd7e29ad58f188cba10816bcd3e8a72a551dca56ae9516e01081b2d9d1ad7c3ebb52b2e7412e402d001b4f0485e090a8d917b924f935ed16a1fdb12877f219ef2758f25991104aa2c78d574d0db3aaa347f42a5c912a51275e86d15264b38fea", 0xe4}, {&(0x7f0000000980)="3c151b6e3c54971927d35cdd1b24495d1efd4f18034b730eab72071af65365f392adb1826d62b486eba732c3334c8c477d1b45a43f7ed9fd9ef6c6aa09d609d9b5fedbe404f7aff017ee8f0a34745fee8f7f24857c800d8c96142fd4f47a4a6f5ea53d107d07bb21ac68bd3d63ce9ebf3fcff5f03d34a7668c601fcb5c1886a24a90b06998aa24f0c40a3944e64ab36e63681773a4ed77afbba3fbb7d80da99a50beaedc8a07ae8930fec306c43fc91f81c34c07180044904fecd707d604e461bcc64991398f21879343705a421af24657b1afdd5267b0beaa27ba7d173b7370b2c58b81a65aaab1710abe5b02f8ef355d244734", 0xf4}, {&(0x7f0000000200)="d63955a78c0ccddda814848661f4566c2409f4", 0x13}, {&(0x7f0000000240)}], 0x4, &(0x7f0000000a80)=[@rights={{0x10}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r2, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0]}}, @rights={{0x30, 0x1, 0x1, [r1, r1, r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8, 0x40084}, 0x200488c1) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x8010) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r3, 0xc4c03d09, 0x0) syz_io_uring_setup(0x48d, &(0x7f0000000880)={0x0, 0x6a2d, 0x4, 0x0, 0x2eb, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000000900), &(0x7f0000000940)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), &(0x7f0000000140)=0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x60000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8040800}, 0x40000) syz_io_uring_submit(0x0, r4, &(0x7f0000000540)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x301000, 0x0)