write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x39, 0xeb, 0x1f, 0xb1, 0x3, 0x2, 0x3, 0xffffffff, 0x188, 0x40, 0xe8, 0xce9, 0xff, 0x38, 0x2, 0xfff9, 0x3b2f, 0x3}, [{0x3, 0x9, 0xc6, 0x7, 0x10001, 0xfffffffffffffff7, 0x4, 0x3}], "f37295f2de371365e8c84b40217809a329e51164e100bd33645ed9dc7310889e097e1ea28b5866ce31ad18c5100d43ce9dcca7da5b5bfdfb19cfd1f323d5ba8fa566dd96497f3fab08f77712f4dab096defd16ca4c36131a74a2860b27e9ba6664f97307f2e5c3f5a5dff2876097bdeb6bb9d268257a4e078eb55f18fafa878dcb4b705147dcbb82ddf5a5f882b8df7d8d86387458f7dcd362c3d9163c40f8cb84edd86158adcefa8c5362dfa7cc133c18b34f8d471aa325b4b0d330ea6e6377534cc3ca2b945edd9cd60556ed46f64c60da4464f5f11d7feb08f094234302630d68954acdd174d6a7f5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xb62) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x7) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r0, 0xba, 0x1) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0)