r0 = openat(0xffffffffffffffff, 0x0, 0x2d3242, 0x84) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, r0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRES16], 0xfdef) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) mount$9p_virtio(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=virtio,cache=none,dfltgid=', @ANYRESHEX=0xee01, @ANYBLOB=',cache=fscache,nodevmap,dfltgid=', @ANYRESHEX, @ANYBLOB=',access=', @ANYRESDEC=0x0, @ANYBLOB=',msize=0x0000000000000101,access=user,debug=0xfffffffffffff597,access=any,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c646566636f6e746578743d75566836c733714f88645f752c002bc16227c7e30fa0f38e13d107778a3bd736"]) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r3, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, &(0x7f0000000180)=0x80) quotactl(0x2, &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000680)="69eb1e6f327054e098d4b672a2ac69e4a486eec99baaeb24bc9dc28efe8d0c838961f1d61ceaf812d84d496f943e749abf74baedc04a5553b47861f92ca15074048c41addccf37") r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8c00, 0x1a0) mmap$usbmon(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2000000, 0x1010, r4, 0x6) openat(r4, &(0x7f0000000040)='./file0\x00', 0x40000, 0x80)