sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x40000) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0xc0, 0x13, 0x9, 0x201, 0x70bd26, 0x25dfdbfe, {0x1}, [@generic="8ebaec44d1daec9c73f81e7daef3b762369c57ce02d670f73df2ff0ca6abf1c874a3d026e78e707b9d5bcd9bf09facbe96be5921896f6cc31e54a94f06d780a6b40f9245cccd8c5ea6a7ac38bce72acbf22301ee68f817dafbfb590daa2c0e9bb4491d21dcadb5815465852b2c620bae0f9bcc88ea3e17a0da349f9a73e8b049bbb90cc35000817c8f25ab30c2e00cf9d3faa36f9ddf0cfe556c825276c0906c44be5214dd0ddd9440b41541"]}, 0xc0}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000540)={{{@in=@private, @in=@private}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f0000000200)=0xe8) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), &(0x7f0000000180)='./file1\x00', 0x8, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0)