Warning: Permanently added '10.128.0.160' (ECDSA) to the list of known hosts. 2021/05/20 17:32:28 fuzzer started 2021/05/20 17:32:28 dialing manager at 10.128.0.163:39137 2021/05/20 17:32:28 syscalls: 1997 2021/05/20 17:32:28 code coverage: enabled 2021/05/20 17:32:28 comparison tracing: enabled 2021/05/20 17:32:28 extra coverage: enabled 2021/05/20 17:32:28 setuid sandbox: enabled 2021/05/20 17:32:28 namespace sandbox: enabled 2021/05/20 17:32:28 Android sandbox: enabled 2021/05/20 17:32:28 fault injection: enabled 2021/05/20 17:32:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/20 17:32:28 net packet injection: /dev/net/tun does not exist 2021/05/20 17:32:28 net device setup: enabled 2021/05/20 17:32:28 concurrency sanitizer: enabled 2021/05/20 17:32:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/20 17:32:28 USB emulation: /dev/raw-gadget does not exist 2021/05/20 17:32:28 hci packet injection: /dev/vhci does not exist 2021/05/20 17:32:28 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/05/20 17:32:28 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/05/20 17:32:29 suppressing KCSAN reports in functions: '__xa_clear_mark' '_find_next_bit' 'dd_has_work' 'n_tty_receive_buf_common' 'kauditd_thread' '__send_signal' 'alloc_pid' 'ext4_free_inodes_count' 'lookup_fast' 'blk_mq_sched_dispatch_requests' 'do_sys_poll' 'internal_add_timer' 'do_nanosleep' '__ext4_new_inode' 'generic_write_end' '__ext4_update_other_inode_time' 'xas_clear_mark' 'tick_nohz_next_event' 2021/05/20 17:32:29 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/20 17:32:29 fetching corpus: 45, signal 18477/21921 (executing program) 2021/05/20 17:32:29 fetching corpus: 95, signal 25598/30448 (executing program) 2021/05/20 17:32:29 fetching corpus: 145, signal 31182/37303 (executing program) 2021/05/20 17:32:29 fetching corpus: 195, signal 34391/41826 (executing program) 2021/05/20 17:32:29 fetching corpus: 245, signal 39385/47864 (executing program) 2021/05/20 17:32:29 fetching corpus: 295, signal 43226/52696 (executing program) 2021/05/20 17:32:29 fetching corpus: 345, signal 47400/57771 (executing program) 2021/05/20 17:32:29 fetching corpus: 395, signal 51206/62329 (executing program) 2021/05/20 17:32:29 fetching corpus: 445, signal 54683/66494 (executing program) 2021/05/20 17:32:29 fetching corpus: 495, signal 57239/69800 (executing program) 2021/05/20 17:32:30 fetching corpus: 545, signal 61682/74552 (executing program) 2021/05/20 17:32:30 fetching corpus: 595, signal 63924/77415 (executing program) 2021/05/20 17:32:30 fetching corpus: 645, signal 66977/80815 (executing program) 2021/05/20 17:32:30 fetching corpus: 695, signal 69902/84039 (executing program) 2021/05/20 17:32:30 fetching corpus: 745, signal 72589/87013 (executing program) 2021/05/20 17:32:30 fetching corpus: 795, signal 73757/88806 (executing program) 2021/05/20 17:32:30 fetching corpus: 845, signal 75889/91185 (executing program) 2021/05/20 17:32:30 fetching corpus: 895, signal 77415/93133 (executing program) 2021/05/20 17:32:30 fetching corpus: 945, signal 79330/95274 (executing program) 2021/05/20 17:32:30 fetching corpus: 995, signal 81690/97672 (executing program) 2021/05/20 17:32:30 fetching corpus: 1045, signal 83557/99649 (executing program) 2021/05/20 17:32:30 fetching corpus: 1095, signal 85032/101313 (executing program) 2021/05/20 17:32:30 fetching corpus: 1145, signal 86716/103074 (executing program) 2021/05/20 17:32:30 fetching corpus: 1195, signal 88808/105081 (executing program) syzkaller login: [ 20.505563][ T1782] ================================================================== [ 20.507349][ T1782] BUG: KCSAN: data-race in futex_wait_queue_me / prepare_signal [ 20.508660][ T1782] [ 20.509047][ T1782] write to 0xffff888105ea306c of 4 bytes by task 1780 on cpu 1: [ 20.510172][ T1782] futex_wait_queue_me+0x198/0x260 [ 20.510988][ T1782] futex_wait+0x143/0x430 [ 20.511688][ T1782] do_futex+0x9d8/0x1ee0 [ 20.512375][ T1782] __se_sys_futex+0x21c/0x380 [ 20.513056][ T1782] __x64_sys_futex+0x74/0x80 [ 20.513735][ T1782] do_syscall_64+0x4a/0x90 [ 20.514359][ T1782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 20.515383][ T1782] [ 20.515853][ T1782] read to 0xffff888105ea306c of 4 bytes by task 1782 on cpu 0: [ 20.516904][ T1782] prepare_signal+0x952/0xeb0 [ 20.517655][ T1782] __send_signal+0x64/0x760 [ 20.518555][ T1782] send_signal+0x281/0x390 [ 20.519226][ T1782] do_send_specific+0x13d/0x1c0 [ 20.519958][ T1782] __x64_sys_tgkill+0x108/0x140 [ 20.520721][ T1782] do_syscall_64+0x4a/0x90 [ 20.521386][ T1782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 20.522282][ T1782] [ 20.522668][ T1782] Reported by Kernel Concurrency Sanitizer on: [ 20.523774][ T1782] CPU: 0 PID: 1782 Comm: syz-fuzzer Not tainted 5.13.0-rc2-syzkaller #0 [ 20.525070][ T1782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.531431][ T1782] ================================================================== 2021/05/20 17:32:30 fetching corpus: 1245, signal 89777/106336 (executing program) 2021/05/20 17:32:30 fetching corpus: 1295, signal 91220/107862 (executing program) 2021/05/20 17:32:31 fetching corpus: 1345, signal 92756/109409 (executing program) 2021/05/20 17:32:31 fetching corpus: 1395, signal 95298/111439 (executing program) 2021/05/20 17:32:31 fetching corpus: 1445, signal 96329/112548 (executing program) 2021/05/20 17:32:31 fetching corpus: 1495, signal 98559/114242 (executing program) 2021/05/20 17:32:31 fetching corpus: 1545, signal 99297/115136 (executing program) 2021/05/20 17:32:31 fetching corpus: 1595, signal 100734/116344 (executing program) 2021/05/20 17:32:31 fetching corpus: 1645, signal 101455/117143 (executing program) 2021/05/20 17:32:31 fetching corpus: 1695, signal 102385/118079 (executing program) 2021/05/20 17:32:31 fetching corpus: 1745, signal 103459/119017 (executing program) 2021/05/20 17:32:31 fetching corpus: 1795, signal 104683/119968 (executing program) 2021/05/20 17:32:31 fetching corpus: 1845, signal 105608/120765 (executing program) 2021/05/20 17:32:31 fetching corpus: 1895, signal 106473/121546 (executing program) 2021/05/20 17:32:31 fetching corpus: 1945, signal 107129/122188 (executing program) 2021/05/20 17:32:31 fetching corpus: 1995, signal 108290/123056 (executing program) 2021/05/20 17:32:31 fetching corpus: 2045, signal 109880/123924 (executing program) 2021/05/20 17:32:31 fetching corpus: 2095, signal 110893/124586 (executing program) 2021/05/20 17:32:31 fetching corpus: 2145, signal 111533/125107 (executing program) 2021/05/20 17:32:31 fetching corpus: 2195, signal 112648/125727 (executing program) 2021/05/20 17:32:32 fetching corpus: 2245, signal 114129/126502 (executing program) 2021/05/20 17:32:32 fetching corpus: 2295, signal 114977/127005 (executing program) 2021/05/20 17:32:32 fetching corpus: 2345, signal 115957/127532 (executing program) 2021/05/20 17:32:32 fetching corpus: 2394, signal 117047/128033 (executing program) 2021/05/20 17:32:32 fetching corpus: 2444, signal 118191/128485 (executing program) 2021/05/20 17:32:32 fetching corpus: 2494, signal 119346/128942 (executing program) 2021/05/20 17:32:32 fetching corpus: 2544, signal 120171/129301 (executing program) 2021/05/20 17:32:32 fetching corpus: 2594, signal 120975/129623 (executing program) 2021/05/20 17:32:32 fetching corpus: 2644, signal 121712/129921 (executing program) 2021/05/20 17:32:32 fetching corpus: 2693, signal 124809/130575 (executing program) 2021/05/20 17:32:32 fetching corpus: 2743, signal 125543/130798 (executing program) 2021/05/20 17:32:32 fetching corpus: 2793, signal 126311/130978 (executing program) 2021/05/20 17:32:32 fetching corpus: 2843, signal 127421/131191 (executing program) 2021/05/20 17:32:32 fetching corpus: 2893, signal 128368/131357 (executing program) 2021/05/20 17:32:32 fetching corpus: 2943, signal 129106/131480 (executing program) 2021/05/20 17:32:32 fetching corpus: 2993, signal 129791/131585 (executing program) 2021/05/20 17:32:32 fetching corpus: 3019, signal 130243/131657 (executing program) 2021/05/20 17:32:32 fetching corpus: 3019, signal 130243/131680 (executing program) 2021/05/20 17:32:32 fetching corpus: 3019, signal 130243/131700 (executing program) 2021/05/20 17:32:32 fetching corpus: 3019, signal 130243/131717 (executing program) 2021/05/20 17:32:32 fetching corpus: 3019, signal 130243/131728 (executing program) 2021/05/20 17:32:32 fetching corpus: 3019, signal 130243/131728 (executing program) 2021/05/20 17:32:34 starting 6 fuzzer processes 17:32:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') utimensat(r0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x3ffffffe}}, 0x0) 17:32:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/91, 0x5b}], 0x1, 0x40, 0x0) 17:32:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x25, &(0x7f0000000140)="c4c691019919daffffff7fc5d61abc6cd1b3ddac7d0098d3e0a5fc79c0fe7282987364e69e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="eb718ab0155c728d7ad07e9ba49a9f7a496bd61116153877c4b24051f0d3c0de680927ad14db646af249f193") r1 = gettid() tkill(r1, 0x40) 17:32:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 17:32:34 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000005b40)) 17:32:34 executing program 4: syz_io_uring_setup(0x432c, &(0x7f0000000100)={0x0, 0xfffffffd, 0x8}, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000000000), &(0x7f0000000200)) [ 23.968798][ T25] audit: type=1400 audit(1621531954.266:8): avc: denied { execmem } for pid=1793 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 24.064195][ T1798] cgroup: Unknown subsys name 'perf_event' [ 24.089017][ T1798] cgroup: Unknown subsys name 'net_cls' [ 24.112343][ T1799] cgroup: Unknown subsys name 'perf_event' [ 24.113601][ T1800] cgroup: Unknown subsys name 'perf_event' [ 24.125043][ T1801] cgroup: Unknown subsys name 'perf_event' [ 24.127268][ T1799] cgroup: Unknown subsys name 'net_cls' [ 24.131261][ T1801] cgroup: Unknown subsys name 'net_cls' [ 24.142853][ T1800] cgroup: Unknown subsys name 'net_cls' [ 24.150783][ T1804] cgroup: Unknown subsys name 'perf_event' [ 24.160092][ T1807] cgroup: Unknown subsys name 'perf_event' [ 24.164068][ T1804] cgroup: Unknown subsys name 'net_cls' [ 24.175595][ T1807] cgroup: Unknown subsys name 'net_cls' 17:32:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 17:32:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 17:32:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 17:32:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x25, &(0x7f0000000140)="c4c691019919daffffff7fc5d61abc6cd1b3ddac7d0098d3e0a5fc79c0fe7282987364e69e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="eb718ab0155c728d7ad07e9ba49a9f7a496bd61116153877c4b24051f0d3c0de680927ad14db646af249f193") r1 = gettid() tkill(r1, 0x40) 17:32:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/91, 0x5b}], 0x1, 0x40, 0x0) 17:32:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x25, &(0x7f0000000140)="c4c691019919daffffff7fc5d61abc6cd1b3ddac7d0098d3e0a5fc79c0fe7282987364e69e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="eb718ab0155c728d7ad07e9ba49a9f7a496bd61116153877c4b24051f0d3c0de680927ad14db646af249f193") r1 = gettid() tkill(r1, 0x40) [ 28.316138][ T25] audit: type=1400 audit(1621531958.608:9): avc: denied { setattr } for pid=4522 comm="syz-executor.0" name="fd" dev="proc" ino=15004 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 17:32:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') utimensat(r0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x3ffffffe}}, 0x0) 17:32:38 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="167f024afe2934ab3d3b12d78eb19c403b"], 0x2}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x2d) 17:32:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/91, 0x5b}], 0x1, 0x40, 0x0) 17:32:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x25, &(0x7f0000000140)="c4c691019919daffffff7fc5d61abc6cd1b3ddac7d0098d3e0a5fc79c0fe7282987364e69e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="eb718ab0155c728d7ad07e9ba49a9f7a496bd61116153877c4b24051f0d3c0de680927ad14db646af249f193") r1 = gettid() tkill(r1, 0x40) 17:32:38 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000005b40)) 17:32:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') utimensat(r0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x3ffffffe}}, 0x0) 17:32:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/91, 0x5b}], 0x1, 0x40, 0x0) 17:32:38 executing program 5: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000040)="2600000022004701050000000002000005e1065a546feb1c04adb017ca5bdec1e98ae4ab5500", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:32:38 executing program 4: syz_io_uring_setup(0x432c, &(0x7f0000000100)={0x0, 0xfffffffd, 0x8}, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000000000), &(0x7f0000000200)) 17:32:38 executing program 4: syz_io_uring_setup(0x432c, &(0x7f0000000100)={0x0, 0xfffffffd, 0x8}, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000000000), &(0x7f0000000200)) 17:32:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') utimensat(r0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x3ffffffe}}, 0x0) 17:32:38 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000640)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60000000a84302910000003900080008000c0040", 0x25}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000101, 0x0) 17:32:38 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000005b40))