r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x7f, 0x5}, {0x5, 0x0, 0x1, 0x3}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000580)=ANY=[@ANYBLOB="070000000700000000efff000000007ed8487c35c97ce46bc77944469551eeab973cb29e75191bfb010069acb18a51a73a7d210a33086066d41c9acd8cdb91366b97bdd67cf36eaf7a206f8447e760e0f0fbedc930a72f6dd0a09c088bba805f8b8e19f5473d9b67b05ad720bb9d00a3c688ed9870"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000500)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101982, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xa9, 0x12, 0x1d, 0x19, "6e60147ae2fcdc3f1d52584aebeafaa0edd69266edf29bbff612a7a730c97b72b322d0b8aff13a679593d52a3c987ef7c88e49e70f44c10f719a7c0f41774981", "f8258a6ec00c2423b3415e80f5dcc6b04bdfa5322086b2c40bc141347fe2216a", [0x100000001, 0x9]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x220000, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0xfff, 0x0, 0x13, 0x0, "a33ffde15ac5e3597997ca8986bc6d30fb365a162412350d2dbb5f02e4b9158f3b699d557e93639a919a636fc399cb69327ad1688070049903904fc96628577b", "2f87934459fd43a9829984709a2e821126913d74f3d1ad8285ca2e3a4a403d99", [0xffff, 0x80]}) creat(&(0x7f0000000380)='./file0\x00', 0x9) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000200)=ANY=[@ANYBLOB="9789cdc1a58bb7523a45992fbb476b7ba2f081093dc81803cc6745a634a85feaf8ebcd4ec14543c88d990c72ba873c406408925ef7240019f7bd2bc2541505748aaf018bad5ffbb866b332d87a3c99b80c1603203a1131ef91e6"]) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000600)={'mangle\x00', 0xa2, "21669cb87500bef91d3aee893e0f3c4d29681b4dbb262a39426a476951005ae20ba55d3540563ff853c1a1ea3f0edd1739d83a70f807698156e382d77b477f6f93a70ced515825b73ebf3e36d82e7486187c5a3567548bd07709a39a877118036cec71630fb9ab8586d9060dbbae7d3ecd4baaea260e2da82bc9cc2468158c4c05daa0abc3ec4ff7b95dd7a4e8e08c2b72efe487be909c3b6c9f1e0b2cf0eb0b67ea"}, &(0x7f0000000140)=0xc6) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) open(&(0x7f0000000080)='./file2\x00', 0x80, 0x26) acct(&(0x7f00000001c0)='./file1\x00') openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x20082, 0xf4)