getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) r1 = geteuid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x5}, [{0x2, 0x2, 0xee01}, {0x2, 0x1, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x4}, {0x2, 0x3, r1}, {0x2, 0x7, 0xffffffffffffffff}], {0x4, 0x2}, [{0x8, 0x2, 0xee00}], {}, {0x20, 0x1}}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x164) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'trusted.', 'system.posix_acl_access\x00'}, &(0x7f0000000300)=""/80, 0x50) lsetxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000400)='system_u:object_r:inetd_child_exec_t:s0\x00', 0x28, 0x1) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/18, 0x12}, {&(0x7f00000005c0)=""/158, 0x9e}, {&(0x7f0000000680)=""/163, 0xa3}, {&(0x7f0000000740)=""/98, 0x62}], 0x4, &(0x7f0000000800)=""/28, 0x1c}, 0x7229}], 0x1, 0x20, &(0x7f0000000880)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000001c00)={0x0, 0x0, 0x7f, 0xff}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000001cc0)={'sit0\x00', &(0x7f0000001c40)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x80, 0x7, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x1, 0x10, 0x3ff, 0x1000}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000001e00)={'veth1_to_batadv\x00', &(0x7f0000001d00)=@ethtool_rxnfc={0x2f, 0x7, 0x6, {0xd, @tcp_ip4_spec={@rand_addr=0x64010101, @multicast2, 0x4e21, 0x4e21, 0x2}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, 0x4a, 0x0, [0x7, 0x1]}, @sctp_ip6_spec={@mcast1, @private2, 0x4e22, 0x4e23, 0x9}, {0x0, @multicast, 0x800, 0x569, [0x6, 0xb7e4]}, 0x4b, 0x9}, 0x6, [0x7f, 0x7, 0x7, 0x80000001, 0x2, 0xffffff94]}}) execveat(0xffffffffffffffff, &(0x7f0000001e40)='./file0\x00', &(0x7f0000001f00)=[&(0x7f0000001e80)='system_u:object_r:inetd_child_exec_t:s0\x00', &(0x7f0000001ec0)='system.posix_acl_access\x00'], &(0x7f0000002040)=[&(0x7f0000001f40)='\x00', &(0x7f0000001f80)='%:\x00', &(0x7f0000001fc0)='\xbb\xbb\xbb\xbb\xbb\xbb', &(0x7f0000002000)='\xbb\xbb\xbb\xbb\xbb\xbb'], 0x400) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000002240)) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300))