perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x342, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e20, @rand_addr=0x64010102}, {0x2, 0x4e22, @broadcast}, 0x24d, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)='wg2\x00', 0x2, 0x2, 0xff}) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) dup2(r2, r1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/1561], 0x619) fallocate(r1, 0x3, 0x0, 0x30000000000) r3 = inotify_init() ioctl$BTRFS_IOC_QGROUP_LIMIT(r2, 0x8030942b, &(0x7f00000007c0)={0xff, {0x22, 0x0, 0x100, 0x7, 0x5552}}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, 0x0) r4 = open$dir(&(0x7f0000000800)='./file0\x00', 0x8040, 0x4) fcntl$setlease(r4, 0x400, 0x0) dup(r3) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000000), 0x400000d, 0x34000)