r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}, 0x10c, 0x7d6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)="b343ba3a06e764cf30690050b624600b67bf48f93561a8721370fa9483263799b82feeb7b9f91d8bf80a51dea7748be553383617514ea63773094fa486e267d9c5c8a17e7142b7d007a397f01895a048d54802a100aa68ad7f62dcd85232d7aae8a70d6c774898952995b4e89802353ec105109a8b5cfd60", 0x78}, {&(0x7f0000000180)="9acbc44e19afa142be168d56e18277f62b2bae73c43b77c1470d301e1de02c506607a430f283545f38443bd173a7e7fee5fdd2bb26e385fd735b0e728e0b0cd6af9feeb13d4344118cd962b165c6532b35b2fbd9e89e7bbe77c58d841afd262c9a2458ed5f9116379e47a80b9c921034b935c1cc0d66974e618e34ef88436230d0d6d812ce75d54feb3c57226cfabf573bd0112918378a1c743eb15656ffb0c9aab4dd64e07f305c553196f03425d4cde672c8cf16ff55b1f88436a63f0b8d69c5670c0cd2", 0xc5}], 0x2) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, &(0x7f0000001e00)={{r0}, 0x0, 0x1c, @unused=[0x2, 0x7f, 0x7fff, 0x3], @devid}) dup2(r0, r0) clone3(&(0x7f0000000080)={0x1040900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x3f})