perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x5b, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = accept4$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000300)=0x6e, 0x40000) statx(0xffffffffffffff9c, &(0x7f0000001700)='./file1\x00', 0x6000, 0x200, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getpgid(0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001a80)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0200002700030028bd7000fcdbdf2514000000280252805a054481e73686227d20fa97d67920afdaec1210d7416e8ff76b73af57de38d04460fa90e33d1dbafe8c7d8f365afaec110baa1d0f0e9c31e94a91186280ae8e338ef03e5ca3d1e9cc47706d062eedad579bd7c0661e89eaa6a1c8491b08171a92484bafcc39e37c08006e00", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="0bb340f4efceda884646b126df27f61983a6fa0c91016b49aa16a0080f27e23990f55666949a558805606bb48cf638a0df6d5b55bb8d8a147f6f6cbb0297f8821cf3f22fc991239c5b5d0fd9837f820730866b6cd4daefc88d4e42cd32ec270e41d6986b55d30c2c4e385d6c14c1b937ab137c156784e40faf6c064293a61a2b9b16daa33ab2bebb0ffa304b2c8cd6070f9c0c65c3b41e963c0cb5bc4dde6fd4f108004400", @ANYRES32=r2, @ANYBLOB], 0x23c}, 0x1, 0x0, 0x0, 0x60}, 0x40000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x802c2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x4, 0xfffffffffffffffc}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x4, 0xffffffff, 0x1f, 0x4}) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0x40001) read(0xffffffffffffffff, &(0x7f0000000140)=""/123, 0x7b) lseek(0xffffffffffffffff, 0x2, 0x4)