_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2305.811668][ T4665] IPVS: ftp: loaded support on port[0] = 21 04:05:35 executing program 2: syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) close(r0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) close(r0) [ 2306.025719][ T4668] IPVS: ftp: loaded support on port[0] = 21 04:05:35 executing program 2: 04:05:35 executing program 2: 04:05:36 executing program 2: 04:05:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:36 executing program 2: 04:05:36 executing program 2: [ 2306.678902][ T4682] IPVS: ftp: loaded support on port[0] = 21 04:05:38 executing program 0: 04:05:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) open$dir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r2}], 0x1, &(0x7f0000000500)={0x0, r3+10000000}, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:05:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2308.719526][ T4691] IPVS: ftp: loaded support on port[0] = 21 04:05:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2310.248842][ T4703] IPVS: ftp: loaded support on port[0] = 21 04:05:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:40 executing program 0: 04:05:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x0, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc3", 0x72) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:40 executing program 2: 04:05:40 executing program 0: 04:05:40 executing program 2: [ 2310.538778][ T4709] IPVS: ftp: loaded support on port[0] = 21 [ 2310.590111][ T4708] IPVS: ftp: loaded support on port[0] = 21 04:05:40 executing program 2: 04:05:40 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="120000000000000084000000060000003e690378515f1c166f46"], 0x1a}, 0x0) [ 2310.649610][ T4712] IPVS: ftp: loaded support on port[0] = 21 04:05:40 executing program 2: 04:05:40 executing program 0: 04:05:43 executing program 0: 04:05:43 executing program 2: 04:05:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2314.216251][ T4733] IPVS: ftp: loaded support on port[0] = 21 04:05:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x0, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 0: 04:05:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc3", 0x72) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 2: 04:05:44 executing program 2: r0 = getpid() fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>'}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000600)={'syz'}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0x0, 0x80, 0x0, 0x0, r1}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x1, 0xdc, 0x4}, {0x8, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(0xffffffffffffffff, &(0x7f0000000740), 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r5, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) 04:05:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010707021dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 2314.648568][ T4738] IPVS: ftp: loaded support on port[0] = 21 [ 2314.674906][ T4752] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:05:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2314.747501][ T4742] IPVS: ftp: loaded support on port[0] = 21 [ 2314.764890][ T4746] IPVS: ftp: loaded support on port[0] = 21 04:05:44 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x7ff) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000300)='veth1_to_team\x00') pwritev(r2, &(0x7f0000000100), 0x0, 0x0) statx(r1, &(0x7f0000001200)='./bus\x00', 0x1000, 0x0, &(0x7f0000001240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'security.', 'y\x00'}, 0x0, 0x0) lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getegid() getpid() ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) get_thread_area(&(0x7f0000000280)={0x14, 0x0, 0x0, 0x800000, 0xfffffffffffffffe, 0x7fff, 0x2, 0x4, 0x8001, 0x7fff}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x40000000, 0x10000101) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000000100)) eventfd2(0x0, 0x0) 04:05:44 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x10) [ 2315.001988][ T4844] IPVS: ftp: loaded support on port[0] = 21 04:05:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2315.329600][ T4972] IPVS: ftp: loaded support on port[0] = 21 [ 2315.432348][ T4975] IPVS: ftp: loaded support on port[0] = 21 04:05:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x0, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2318.478622][ T4981] IPVS: ftp: loaded support on port[0] = 21 [ 2318.564059][ T4983] IPVS: ftp: loaded support on port[0] = 21 [ 2318.603266][ T4986] IPVS: ftp: loaded support on port[0] = 21 04:05:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2318.848086][ T4990] IPVS: ftp: loaded support on port[0] = 21 [ 2318.867836][ T4988] IPVS: ftp: loaded support on port[0] = 21 [ 2318.923748][ T4992] IPVS: ftp: loaded support on port[0] = 21 04:05:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2319.562820][ T4995] IPVS: ftp: loaded support on port[0] = 21 [ 2319.652661][ T4998] IPVS: ftp: loaded support on port[0] = 21 [ 2319.728071][ T5001] IPVS: ftp: loaded support on port[0] = 21 04:05:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2320.485895][ T5004] IPVS: ftp: loaded support on port[0] = 21 [ 2320.537710][ T5008] IPVS: ftp: loaded support on port[0] = 21 [ 2320.570298][ T5009] IPVS: ftp: loaded support on port[0] = 21 04:05:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0x0, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2323.710857][ T5013] IPVS: ftp: loaded support on port[0] = 21 [ 2323.908212][ T5016] IPVS: ftp: loaded support on port[0] = 21 04:05:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2324.235628][ T5019] IPVS: ftp: loaded support on port[0] = 21 [ 2324.314619][ T5021] IPVS: ftp: loaded support on port[0] = 21 04:05:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0x0, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2324.678336][ T5024] IPVS: ftp: loaded support on port[0] = 21 04:05:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0x0, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2325.293922][ T5026] IPVS: ftp: loaded support on port[0] = 21 04:05:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2325.790958][ T5030] IPVS: ftp: loaded support on port[0] = 21 04:05:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2326.050957][ T5032] IPVS: ftp: loaded support on port[0] = 21 04:05:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x0, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2326.269829][ T5036] IPVS: ftp: loaded support on port[0] = 21 04:05:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2328.850836][ T5039] IPVS: ftp: loaded support on port[0] = 21 04:05:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2329.492118][ T5042] IPVS: ftp: loaded support on port[0] = 21 [ 2329.526832][ T5044] IPVS: ftp: loaded support on port[0] = 21 [ 2329.754988][ T5048] IPVS: ftp: loaded support on port[0] = 21 04:06:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x0, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2331.704812][ T5050] IPVS: ftp: loaded support on port[0] = 21 [ 2331.832116][ T5056] IPVS: ftp: loaded support on port[0] = 21 [ 2331.881402][ T5054] IPVS: ftp: loaded support on port[0] = 21 04:06:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2334.941167][ T5059] IPVS: ftp: loaded support on port[0] = 21 [ 2335.066965][ T5062] IPVS: ftp: loaded support on port[0] = 21 04:06:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2335.765030][ T5066] IPVS: ftp: loaded support on port[0] = 21 04:06:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2335.939447][ T5069] IPVS: ftp: loaded support on port[0] = 21 [ 2336.131354][ T5073] IPVS: ftp: loaded support on port[0] = 21 04:06:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2337.326051][ T5075] IPVS: ftp: loaded support on port[0] = 21 04:06:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43"}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x0, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2337.587333][ T5079] IPVS: ftp: loaded support on port[0] = 21 [ 2337.588173][ T5081] IPVS: ftp: loaded support on port[0] = 21 04:06:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2340.420285][ T5084] IPVS: ftp: loaded support on port[0] = 21 04:06:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2341.328447][ T5088] IPVS: ftp: loaded support on port[0] = 21 [ 2341.342235][ T5090] IPVS: ftp: loaded support on port[0] = 21 04:06:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 04:06:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2342.313339][ T5093] IPVS: ftp: loaded support on port[0] = 21 [ 2342.367708][ T5097] IPVS: ftp: loaded support on port[0] = 21 [ 2342.407687][ T5100] IPVS: ftp: loaded support on port[0] = 21 04:06:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43"}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2343.241882][ T5103] IPVS: ftp: loaded support on port[0] = 21 04:06:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x0, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2343.453132][ T5108] IPVS: ftp: loaded support on port[0] = 21 [ 2343.487928][ T5106] IPVS: ftp: loaded support on port[0] = 21 [ 2343.546987][ T5111] IPVS: ftp: loaded support on port[0] = 21 04:06:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2344.406370][ T5113] IPVS: ftp: loaded support on port[0] = 21 04:06:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2345.223571][ T5115] IPVS: ftp: loaded support on port[0] = 21 04:06:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a55", 0x96) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2346.153869][ T5117] IPVS: ftp: loaded support on port[0] = 21 04:06:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2346.730631][ T5120] IPVS: ftp: loaded support on port[0] = 21 [ 2346.849200][ T5123] IPVS: ftp: loaded support on port[0] = 21 04:06:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a55", 0x96) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2347.081213][ T5125] IPVS: ftp: loaded support on port[0] = 21 04:06:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2348.873409][ T5128] IPVS: ftp: loaded support on port[0] = 21 04:06:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43"}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2349.259643][ T5131] IPVS: ftp: loaded support on port[0] = 21 04:06:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2349.817630][ T5135] IPVS: ftp: loaded support on port[0] = 21 04:06:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x0, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2350.334602][ T5138] IPVS: ftp: loaded support on port[0] = 21 04:06:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2350.521232][ T5141] IPVS: ftp: loaded support on port[0] = 21 [ 2350.747828][ T5144] IPVS: ftp: loaded support on port[0] = 21 04:06:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2351.643239][ T5147] IPVS: ftp: loaded support on port[0] = 21 04:06:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 04:06:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2352.550951][ T5150] IPVS: ftp: loaded support on port[0] = 21 [ 2352.615115][ T5153] IPVS: ftp: loaded support on port[0] = 21 04:06:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2352.880024][ T5156] IPVS: ftp: loaded support on port[0] = 21 04:06:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a55", 0x96) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2353.282700][ T5158] IPVS: ftp: loaded support on port[0] = 21 04:06:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x0, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2354.832032][ T5161] IPVS: ftp: loaded support on port[0] = 21 [ 2354.996816][ T5164] IPVS: ftp: loaded support on port[0] = 21 04:06:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x0, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2355.914852][ T5167] IPVS: ftp: loaded support on port[0] = 21 04:06:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x0, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2356.835863][ T5170] IPVS: ftp: loaded support on port[0] = 21 04:06:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x0, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2357.750032][ T5173] IPVS: ftp: loaded support on port[0] = 21 04:06:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0x0, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2358.579566][ T5176] IPVS: ftp: loaded support on port[0] = 21 [ 2358.640934][ T5179] IPVS: ftp: loaded support on port[0] = 21 04:06:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a", 0x97) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2359.095005][ T5182] IPVS: ftp: loaded support on port[0] = 21 04:06:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2359.239027][ T5184] IPVS: ftp: loaded support on port[0] = 21 [ 2359.440912][ T5187] IPVS: ftp: loaded support on port[0] = 21 04:06:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2360.328247][ T5190] IPVS: ftp: loaded support on port[0] = 21 [ 2360.489234][ T5193] IPVS: ftp: loaded support on port[0] = 21 04:06:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2363.728648][ T5196] IPVS: ftp: loaded support on port[0] = 21 04:06:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0x0, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2364.396129][ T5199] IPVS: ftp: loaded support on port[0] = 21 04:06:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2364.660246][ T5203] IPVS: ftp: loaded support on port[0] = 21 [ 2364.719524][ T5205] IPVS: ftp: loaded support on port[0] = 21 04:06:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a", 0x97) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2365.220927][ T5207] IPVS: ftp: loaded support on port[0] = 21 04:06:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2366.205639][ T5210] IPVS: ftp: loaded support on port[0] = 21 04:06:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, 0x0) 04:06:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x40000000200000, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:06:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000009e, 0x0) [ 2367.215634][ T5220] IPVS: ftp: loaded support on port[0] = 21 04:06:37 executing program 2: clone(0x40000000200, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000180)=0x1002, 0xfdda) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0, 0x0, 0x0, 0x266}, 0x40032021) 04:06:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) close(r0) [ 2376.368208][ T5314] IPVS: ftp: loaded support on port[0] = 21 04:06:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:06:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 04:06:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2379.916273][ T5326] IPVS: ftp: loaded support on port[0] = 21 [ 2379.927634][ T5322] IPVS: ftp: loaded support on port[0] = 21 04:06:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x0, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:49 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='auxv\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000006c0)={0x2, &(0x7f0000000680)=[{0x7fff}, {0x9, 0x240000000}]}) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x200, 0x0) r2 = getpgid(0x0) ptrace$peek(0x1, r2, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getpgid(0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0)) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="3e5e064eed678a71759738311a99b148a08a226c93ba927367962432d43847f2d92057506cc97c7db0cbf8aa0684c2d0434e44cfb5ba7d7c7834a446ae2ee49ea08abfc43a3ec3ea881bb9ef505b0559a34ea28b721f0ae7e47b3cdbcd84bee6d9f24ece3a24fa089db2563142dc2706a6b1aa12e69b108bff2a7b5e1099a5946572032edd65a213bb848f549dcd67c9481019437b595805112f4ad00e8a47964e18e667ecc293", 0xa7, 0xfffffffffffffff9) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000700)="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", 0x1000, 0xfffffffffffffffe) 04:06:49 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140), 0x0, 0x0) [ 2380.130269][ T5333] IPVS: ftp: loaded support on port[0] = 21 [ 2380.159864][ T5329] IPVS: ftp: loaded support on port[0] = 21 [ 2380.235496][ T5337] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2380.838511][ T5344] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2380.966776][ T5346] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2381.182209][ T5349] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2381.390615][ T5352] IPVS: ftp: loaded support on port[0] = 21 04:06:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:06:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2383.975487][ T5359] IPVS: ftp: loaded support on port[0] = 21 [ 2383.997930][ T5362] IPVS: ftp: loaded support on port[0] = 21 [ 2384.001123][ T5357] IPVS: ftp: loaded support on port[0] = 21 [ 2384.024584][ T5363] IPVS: ftp: loaded support on port[0] = 21 04:06:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x0, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2384.829899][ T5368] IPVS: ftp: loaded support on port[0] = 21 [ 2384.917060][ T5369] IPVS: ftp: loaded support on port[0] = 21 [ 2385.060739][ T5372] IPVS: ftp: loaded support on port[0] = 21 04:06:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2386.034594][ T5375] IPVS: ftp: loaded support on port[0] = 21 04:06:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2388.831271][ T5377] IPVS: ftp: loaded support on port[0] = 21 04:06:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) [ 2389.350333][ T5380] IPVS: ftp: loaded support on port[0] = 21 04:06:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2389.709364][ T5382] IPVS: ftp: loaded support on port[0] = 21 [ 2389.975965][ T5385] IPVS: ftp: loaded support on port[0] = 21 04:06:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:06:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:07:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:07:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x0, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2390.792806][ T5399] IPVS: ftp: loaded support on port[0] = 21 04:07:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2391.155106][ T5402] IPVS: ftp: loaded support on port[0] = 21 [ 2391.222374][ T5404] IPVS: ftp: loaded support on port[0] = 21 04:07:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x0, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2391.681922][ T5407] IPVS: ftp: loaded support on port[0] = 21 04:07:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2392.033868][ T5410] IPVS: ftp: loaded support on port[0] = 21 [ 2392.079538][ T5413] IPVS: ftp: loaded support on port[0] = 21 04:07:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2392.979782][ T5416] IPVS: ftp: loaded support on port[0] = 21 04:07:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2394.881431][ T5420] IPVS: ftp: loaded support on port[0] = 21 04:07:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2395.143766][ T5424] IPVS: ftp: loaded support on port[0] = 21 [ 2395.152068][ T5425] IPVS: ftp: loaded support on port[0] = 21 [ 2395.175270][ T5427] IPVS: ftp: loaded support on port[0] = 21 04:07:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2396.537738][ T5432] IPVS: ftp: loaded support on port[0] = 21 [ 2396.547699][ T5434] IPVS: ftp: loaded support on port[0] = 21 04:07:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2400.802121][ T5437] IPVS: ftp: loaded support on port[0] = 21 04:07:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2400.864907][ T5440] IPVS: ftp: loaded support on port[0] = 21 04:07:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2401.061384][ T5443] IPVS: ftp: loaded support on port[0] = 21 [ 2401.081837][ T5445] IPVS: ftp: loaded support on port[0] = 21 04:07:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2401.694342][ T5448] IPVS: ftp: loaded support on port[0] = 21 04:07:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2401.959278][ T5451] IPVS: ftp: loaded support on port[0] = 21 04:07:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2402.194220][ T5454] IPVS: ftp: loaded support on port[0] = 21 [ 2402.296018][ T5457] IPVS: ftp: loaded support on port[0] = 21 [ 2402.355761][ T5460] IPVS: ftp: loaded support on port[0] = 21 04:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2403.231449][ T5463] IPVS: ftp: loaded support on port[0] = 21 04:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2404.143932][ T5466] IPVS: ftp: loaded support on port[0] = 21 04:07:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2405.099860][ T5469] IPVS: ftp: loaded support on port[0] = 21 04:07:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2405.447601][ T5472] IPVS: ftp: loaded support on port[0] = 21 04:07:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2406.060971][ T5475] IPVS: ftp: loaded support on port[0] = 21 04:07:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2406.399398][ T5478] IPVS: ftp: loaded support on port[0] = 21 04:07:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2407.297579][ T5481] IPVS: ftp: loaded support on port[0] = 21 [ 2407.366468][ T5484] IPVS: ftp: loaded support on port[0] = 21 04:07:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2408.290483][ T5487] IPVS: ftp: loaded support on port[0] = 21 [ 2408.316377][ T5490] IPVS: ftp: loaded support on port[0] = 21 04:07:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2408.488619][ T5493] IPVS: ftp: loaded support on port[0] = 21 [ 2408.518717][ T5495] IPVS: ftp: loaded support on port[0] = 21 04:07:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2408.936323][ T5498] IPVS: ftp: loaded support on port[0] = 21 [ 2409.015327][ T5501] IPVS: ftp: loaded support on port[0] = 21 04:07:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2411.938825][ T5511] IPVS: ftp: loaded support on port[0] = 21 04:07:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2412.745701][ T5513] IPVS: ftp: loaded support on port[0] = 21 04:07:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2412.990152][ T5516] IPVS: ftp: loaded support on port[0] = 21 04:07:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2413.712118][ T5518] IPVS: ftp: loaded support on port[0] = 21 [ 2413.908315][ T5521] IPVS: ftp: loaded support on port[0] = 21 04:07:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2414.813907][ T5524] IPVS: ftp: loaded support on port[0] = 21 04:07:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2415.046329][ T5527] IPVS: ftp: loaded support on port[0] = 21 [ 2415.064577][ T5538] IPVS: ftp: loaded support on port[0] = 21 [ 2415.202878][ T5541] IPVS: ftp: loaded support on port[0] = 21 04:07:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2415.494263][ T5544] IPVS: ftp: loaded support on port[0] = 21 04:07:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2416.335607][ T5547] IPVS: ftp: loaded support on port[0] = 21 04:07:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2418.791374][ T5549] IPVS: ftp: loaded support on port[0] = 21 04:07:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2419.609645][ T5551] IPVS: ftp: loaded support on port[0] = 21 04:07:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2420.489417][ T5553] IPVS: ftp: loaded support on port[0] = 21 04:07:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2420.600156][ T5559] IPVS: ftp: loaded support on port[0] = 21 [ 2420.666383][ T5563] IPVS: ftp: loaded support on port[0] = 21 [ 2420.689476][ T5565] IPVS: ftp: loaded support on port[0] = 21 [ 2420.841415][ T5568] IPVS: ftp: loaded support on port[0] = 21 04:07:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2421.639446][ T5571] IPVS: ftp: loaded support on port[0] = 21 04:07:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2422.277816][ T5574] IPVS: ftp: loaded support on port[0] = 21 04:07:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2422.539323][ T5577] IPVS: ftp: loaded support on port[0] = 21 04:07:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2423.464720][ T5580] IPVS: ftp: loaded support on port[0] = 21 04:07:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2424.346781][ T5583] IPVS: ftp: loaded support on port[0] = 21 04:07:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2425.289708][ T5586] IPVS: ftp: loaded support on port[0] = 21 04:07:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2426.298428][ T5589] IPVS: ftp: loaded support on port[0] = 21 04:07:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2426.638807][ T5592] IPVS: ftp: loaded support on port[0] = 21 04:07:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2426.712602][ T5594] IPVS: ftp: loaded support on port[0] = 21 [ 2426.881870][ T5597] IPVS: ftp: loaded support on port[0] = 21 04:07:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2427.175625][ T5600] IPVS: ftp: loaded support on port[0] = 21 04:07:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2427.540608][ T5603] IPVS: ftp: loaded support on port[0] = 21 04:07:37 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x1f000000, 0x0, 0x0, 0x0, 0x0) 04:07:38 executing program 3: 04:07:38 executing program 3: 04:07:38 executing program 3: 04:07:38 executing program 3: 04:07:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:38 executing program 3: [ 2429.200867][ T5620] IPVS: ftp: loaded support on port[0] = 21 04:07:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 3: 04:07:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2431.990682][ T5625] IPVS: ftp: loaded support on port[0] = 21 04:07:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) open$dir(0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r2}], 0x1, &(0x7f0000000500)={0x0, r3+10000000}, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x2, 0x200, 0x0, 0x0, 0x5, 0x0, 0x4, 0x1, 0x9, 0x6, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x7, 0xd8, 0x8, 0xc4, 0x3, 0x8, 0x7f, 0x6, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x273, 0x0, 0x100000000, 0x2, @perf_bp={0x0, 0x6}, 0x10, 0x0, 0x2, 0x5, 0x8}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) [ 2432.257184][ T5636] IPVS: ftp: loaded support on port[0] = 21 [ 2432.267518][ T5633] IPVS: ftp: loaded support on port[0] = 21 [ 2432.282026][ T5630] IPVS: ftp: loaded support on port[0] = 21 [ 2432.293356][ T5632] IPVS: ftp: loaded support on port[0] = 21 04:07:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2432.574970][ T5644] IPVS: ftp: loaded support on port[0] = 21 04:07:42 executing program 3: r0 = getpid() r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r4}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) r7 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r2}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x0, 0xdc, 0x4}, {0x0, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(r1, &(0x7f0000000740), 0x8) r8 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r9, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r9, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) 04:07:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:43 executing program 3: r0 = getpid() r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r4}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) r7 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r2}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x0, 0xdc, 0x4}, {0x0, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(r1, &(0x7f0000000740), 0x8) r8 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r9, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r9, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) [ 2433.370213][ T5653] IPVS: ftp: loaded support on port[0] = 21 04:07:43 executing program 3: r0 = getpid() r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r4}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) r7 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r2}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x0, 0xdc, 0x4}, {0x0, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(r1, &(0x7f0000000740), 0x8) r8 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r9, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r9, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) 04:07:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2434.281103][ T5661] IPVS: ftp: loaded support on port[0] = 21 04:07:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000280007031dfffd946f610500070000001f00000000000100421ba3a20400ff7e280000001100ffffba16a0aa1c090000000000001200c00e000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) [ 2436.640536][ T5666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2436.724830][ T5669] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 04:07:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2437.110113][ T5673] IPVS: ftp: loaded support on port[0] = 21 04:07:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:46 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000001200)) 04:07:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2437.314182][ T5676] IPVS: ftp: loaded support on port[0] = 21 [ 2437.349765][ T5684] IPVS: ftp: loaded support on port[0] = 21 [ 2437.358074][ T5681] IPVS: ftp: loaded support on port[0] = 21 [ 2437.374736][ T5686] IPVS: ftp: loaded support on port[0] = 21 [ 2437.587989][ T5689] IPVS: ftp: loaded support on port[0] = 21 04:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2438.131821][ T5692] IPVS: ftp: loaded support on port[0] = 21 04:07:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2438.288392][ T5695] IPVS: ftp: loaded support on port[0] = 21 04:07:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2438.729359][ T5698] IPVS: ftp: loaded support on port[0] = 21 [ 2438.772734][ T5701] IPVS: ftp: loaded support on port[0] = 21 04:07:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2441.894625][ T5704] IPVS: ftp: loaded support on port[0] = 21 04:07:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2442.800866][ T5707] IPVS: ftp: loaded support on port[0] = 21 [ 2442.895126][ T5709] IPVS: ftp: loaded support on port[0] = 21 [ 2442.961008][ T5712] IPVS: ftp: loaded support on port[0] = 21 04:07:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2443.768994][ T5715] IPVS: ftp: loaded support on port[0] = 21 04:07:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2444.564679][ T5718] IPVS: ftp: loaded support on port[0] = 21 04:07:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2444.775645][ T5724] IPVS: ftp: loaded support on port[0] = 21 [ 2444.787675][ T5722] IPVS: ftp: loaded support on port[0] = 21 04:07:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2448.150912][ T5766] IPVS: ftp: loaded support on port[0] = 21 [ 2448.254473][ T5769] IPVS: ftp: loaded support on port[0] = 21 04:07:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2449.020057][ T5772] IPVS: ftp: loaded support on port[0] = 21 04:07:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2449.937838][ T5775] IPVS: ftp: loaded support on port[0] = 21 04:07:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2450.191235][ T5778] IPVS: ftp: loaded support on port[0] = 21 04:07:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2450.342304][ T5781] IPVS: ftp: loaded support on port[0] = 21 [ 2450.427420][ T5784] IPVS: ftp: loaded support on port[0] = 21 04:08:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2451.149390][ T5787] IPVS: ftp: loaded support on port[0] = 21 04:08:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2452.077193][ T5790] IPVS: ftp: loaded support on port[0] = 21 04:08:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2452.868071][ T5793] IPVS: ftp: loaded support on port[0] = 21 04:08:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2453.823441][ T5796] IPVS: ftp: loaded support on port[0] = 21 04:08:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2454.200097][ T5798] IPVS: ftp: loaded support on port[0] = 21 04:08:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2454.662016][ T5801] IPVS: ftp: loaded support on port[0] = 21 04:08:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2455.877328][ T5804] IPVS: ftp: loaded support on port[0] = 21 04:08:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2456.152361][ T5807] IPVS: ftp: loaded support on port[0] = 21 [ 2456.221937][ T5810] IPVS: ftp: loaded support on port[0] = 21 04:08:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2459.746802][ T5828] IPVS: ftp: loaded support on port[0] = 21 [ 2459.821102][ T5830] IPVS: ftp: loaded support on port[0] = 21 04:08:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2460.540320][ T5833] IPVS: ftp: loaded support on port[0] = 21 [ 2460.728088][ T5836] IPVS: ftp: loaded support on port[0] = 21 04:08:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2461.504006][ T5839] IPVS: ftp: loaded support on port[0] = 21 04:08:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2461.788643][ T5844] IPVS: ftp: loaded support on port[0] = 21 [ 2461.837890][ T5845] IPVS: ftp: loaded support on port[0] = 21 04:08:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2465.237984][ T5848] IPVS: ftp: loaded support on port[0] = 21 04:08:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2466.058557][ T5852] IPVS: ftp: loaded support on port[0] = 21 04:08:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2466.126099][ T5854] IPVS: ftp: loaded support on port[0] = 21 [ 2466.363662][ T5856] IPVS: ftp: loaded support on port[0] = 21 04:08:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2467.449961][ T5860] IPVS: ftp: loaded support on port[0] = 21 [ 2467.463692][ T5862] IPVS: ftp: loaded support on port[0] = 21 [ 2467.653909][ T5865] IPVS: ftp: loaded support on port[0] = 21 04:08:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2471.492499][ T5871] IPVS: ftp: loaded support on port[0] = 21 [ 2471.517959][ T5872] IPVS: ftp: loaded support on port[0] = 21 04:08:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2472.004996][ T5874] IPVS: ftp: loaded support on port[0] = 21 04:08:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2472.864333][ T5876] IPVS: ftp: loaded support on port[0] = 21 04:08:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2473.071493][ T5881] IPVS: ftp: loaded support on port[0] = 21 [ 2473.079515][ T5882] IPVS: ftp: loaded support on port[0] = 21 [ 2473.142469][ T5885] IPVS: ftp: loaded support on port[0] = 21 04:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2476.388059][ T5888] IPVS: ftp: loaded support on port[0] = 21 04:08:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2476.740524][ T5891] IPVS: ftp: loaded support on port[0] = 21 04:08:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2477.628513][ T5894] IPVS: ftp: loaded support on port[0] = 21 04:08:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2478.581543][ T5901] IPVS: ftp: loaded support on port[0] = 21 04:08:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2478.680005][ T5905] IPVS: ftp: loaded support on port[0] = 21 [ 2478.698692][ T5907] IPVS: ftp: loaded support on port[0] = 21 [ 2478.897957][ T5909] IPVS: ftp: loaded support on port[0] = 21 04:08:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2479.720747][ T5912] IPVS: ftp: loaded support on port[0] = 21 [ 2479.732151][ T5914] IPVS: ftp: loaded support on port[0] = 21 04:08:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2480.769087][ T5917] IPVS: ftp: loaded support on port[0] = 21 04:08:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2481.294389][ T5920] IPVS: ftp: loaded support on port[0] = 21 04:08:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2481.741414][ T5923] IPVS: ftp: loaded support on port[0] = 21 04:08:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2482.747367][ T5926] IPVS: ftp: loaded support on port[0] = 21 04:08:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2483.757073][ T5929] IPVS: ftp: loaded support on port[0] = 21 [ 2483.805650][ T5933] IPVS: ftp: loaded support on port[0] = 21 04:08:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2484.374826][ T5936] IPVS: ftp: loaded support on port[0] = 21 04:08:34 executing program 3: socketpair(0x25, 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 04:08:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="1fca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2485.136633][ T5946] IPVS: ftp: loaded support on port[0] = 21 04:08:35 executing program 3: mmap(&(0x7f0000198000/0x2000)=nil, 0x2000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) mmap(&(0x7f0000197000/0x10000)=nil, 0x10000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) 04:08:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000080)=""/86, 0x56}, {&(0x7f0000000200)=""/221, 0xdd}, {&(0x7f0000000300)=""/222, 0xde}], 0x3, 0x0) [ 2485.951623][ T5957] IPVS: ftp: loaded support on port[0] = 21 04:08:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:36 executing program 3: ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:08:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2487.024660][ T5963] IPVS: ftp: loaded support on port[0] = 21 [ 2487.090239][ T5968] IPVS: ftp: loaded support on port[0] = 21 04:08:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000080)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x58d9b16a, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1, 0x0, [], 0xffffffff}]}}) 04:08:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:38 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 04:08:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:38 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000040)=0x1, 0x0, 0x1, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052fc73ca67775c541d449502b248099535c6b0b9d43f540ef8c37b41eb2a5b0cd3a4b5feecae8f509732442430e93179bf486d28bbcdb4835"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2488.903376][ T5980] kvm: apic: phys broadcast and lowest prio 04:08:38 executing program 3: r0 = socket$inet(0x2, 0x100000000003, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000100)={{0x11, @dev, 0x0, 0x1, 'wlc\x00'}, {@multicast2}}, 0x44) 04:08:38 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000004c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0xffffffffffffffff, @random="277a4c148d89", 'bridge_slave_0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) [ 2489.007168][ T5976] IPVS: ftp: loaded support on port[0] = 21 [ 2489.026651][ T5978] IPVS: ftp: loaded support on port[0] = 21 04:08:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) 04:08:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@local, 0x0, 0xffffffffffffffff}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x30) fcntl$setstatus(r1, 0x4, 0x42803) [ 2489.455317][ T6004] ptrace attach of "/root/syz-executor.2"[6003] was attempted by "/root/syz-executor.2"[6004] 04:08:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) [ 2491.943201][ T6013] IPVS: ftp: loaded support on port[0] = 21 [ 2491.950630][ T6009] IPVS: ftp: loaded support on port[0] = 21 [ 2491.958636][ T6012] IPVS: ftp: loaded support on port[0] = 21 [ 2491.969433][ T6015] IPVS: ftp: loaded support on port[0] = 21 04:08:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2493.158351][ T6018] IPVS: ftp: loaded support on port[0] = 21 [ 2493.246761][ T6021] IPVS: ftp: loaded support on port[0] = 21 04:08:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2494.237483][ T6024] IPVS: ftp: loaded support on port[0] = 21 04:08:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2495.126337][ T6027] IPVS: ftp: loaded support on port[0] = 21 04:08:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2495.904525][ T6030] IPVS: ftp: loaded support on port[0] = 21 04:08:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2496.761701][ T6033] IPVS: ftp: loaded support on port[0] = 21 04:08:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2497.307734][ T6036] IPVS: ftp: loaded support on port[0] = 21 04:08:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2497.661028][ T6039] IPVS: ftp: loaded support on port[0] = 21 04:08:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x0, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) [ 2498.004422][ T6042] IPVS: ftp: loaded support on port[0] = 21 [ 2498.029372][ T6044] IPVS: ftp: loaded support on port[0] = 21 [ 2498.039932][ T6047] IPVS: ftp: loaded support on port[0] = 21 04:08:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2498.912233][ T6050] IPVS: ftp: loaded support on port[0] = 21 [ 2499.048981][ T6053] IPVS: ftp: loaded support on port[0] = 21 04:08:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2499.890500][ T6056] IPVS: ftp: loaded support on port[0] = 21 04:08:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2500.713649][ T6059] IPVS: ftp: loaded support on port[0] = 21 04:08:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2502.340402][ T6062] IPVS: ftp: loaded support on port[0] = 21 04:08:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2502.802402][ T6065] IPVS: ftp: loaded support on port[0] = 21 04:08:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2503.336789][ T6068] IPVS: ftp: loaded support on port[0] = 21 04:08:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2503.678350][ T6071] IPVS: ftp: loaded support on port[0] = 21 04:08:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:08:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x0, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2504.119827][ T6073] IPVS: ftp: loaded support on port[0] = 21 [ 2504.288117][ T6077] IPVS: ftp: loaded support on port[0] = 21 [ 2504.308640][ T6079] IPVS: ftp: loaded support on port[0] = 21 04:08:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2505.502585][ T6082] IPVS: ftp: loaded support on port[0] = 21 04:08:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2506.381943][ T6086] IPVS: ftp: loaded support on port[0] = 21 [ 2506.392467][ T6088] IPVS: ftp: loaded support on port[0] = 21 04:08:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2507.345553][ T6091] IPVS: ftp: loaded support on port[0] = 21 04:08:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x0, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:59 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) [ 2509.600385][ T6094] IPVS: ftp: loaded support on port[0] = 21 [ 2509.657500][ T6097] IPVS: ftp: loaded support on port[0] = 21 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:08:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:08:59 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2510.101821][ T6109] IPVS: ftp: loaded support on port[0] = 21 [ 2510.128908][ T6104] IPVS: ftp: loaded support on port[0] = 21 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:09:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2510.514513][ T6114] IPVS: ftp: loaded support on port[0] = 21 [ 2510.534239][ T6116] IPVS: ftp: loaded support on port[0] = 21 04:09:01 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2511.765215][ T6119] IPVS: ftp: loaded support on port[0] = 21 04:09:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:09:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2512.350467][ T6129] IPVS: ftp: loaded support on port[0] = 21 [ 2512.443614][ T6127] IPVS: ftp: loaded support on port[0] = 21 [ 2512.450064][ T6128] IPVS: ftp: loaded support on port[0] = 21 [ 2512.474757][ T6130] IPVS: ftp: loaded support on port[0] = 21 04:09:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2512.760841][ T6133] IPVS: ftp: loaded support on port[0] = 21 04:09:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2514.403071][ T6136] IPVS: ftp: loaded support on port[0] = 21 [ 2514.551618][ T6139] IPVS: ftp: loaded support on port[0] = 21 04:09:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2514.743657][ T6142] IPVS: ftp: loaded support on port[0] = 21 04:09:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2515.308437][ T6146] IPVS: ftp: loaded support on port[0] = 21 04:09:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2515.657390][ T6148] IPVS: ftp: loaded support on port[0] = 21 [ 2515.672736][ T6154] IPVS: ftp: loaded support on port[0] = 21 [ 2515.765788][ T6152] IPVS: ftp: loaded support on port[0] = 21 04:09:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 1: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2517.751849][ T6160] IPVS: ftp: loaded support on port[0] = 21 [ 2517.762598][ T6158] IPVS: ftp: loaded support on port[0] = 21 [ 2517.892835][ T6171] IPVS: ftp: loaded support on port[0] = 21 [ 2517.925916][ T6172] IPVS: ftp: loaded support on port[0] = 21 04:09:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2518.210702][ T6175] IPVS: ftp: loaded support on port[0] = 21 [ 2518.336223][ T6177] IPVS: ftp: loaded support on port[0] = 21 04:09:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2518.917007][ T6184] IPVS: ftp: loaded support on port[0] = 21 [ 2518.987639][ T6180] IPVS: ftp: loaded support on port[0] = 21 04:09:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2519.337090][ T6187] IPVS: ftp: loaded support on port[0] = 21 04:09:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2520.953793][ T6191] IPVS: ftp: loaded support on port[0] = 21 04:09:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2521.307980][ T6194] IPVS: ftp: loaded support on port[0] = 21 [ 2521.405404][ T6196] IPVS: ftp: loaded support on port[0] = 21 04:09:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x0, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2521.969360][ T6200] IPVS: ftp: loaded support on port[0] = 21 04:09:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x0, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2523.076209][ T6203] IPVS: ftp: loaded support on port[0] = 21 [ 2523.214918][ T6208] IPVS: ftp: loaded support on port[0] = 21 [ 2523.229991][ T6206] IPVS: ftp: loaded support on port[0] = 21 04:09:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2523.575451][ T6211] IPVS: ftp: loaded support on port[0] = 21 04:09:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2524.022573][ T6213] IPVS: ftp: loaded support on port[0] = 21 04:09:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2524.298451][ T6216] IPVS: ftp: loaded support on port[0] = 21 [ 2524.307714][ T6219] IPVS: ftp: loaded support on port[0] = 21 04:09:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2525.985720][ T6222] IPVS: ftp: loaded support on port[0] = 21 04:09:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2526.905351][ T6225] IPVS: ftp: loaded support on port[0] = 21 04:09:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2527.779784][ T6228] IPVS: ftp: loaded support on port[0] = 21 04:09:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2528.704875][ T6231] IPVS: ftp: loaded support on port[0] = 21 04:09:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x0, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.022030][ T6234] IPVS: ftp: loaded support on port[0] = 21 04:09:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.553989][ T6237] IPVS: ftp: loaded support on port[0] = 21 04:09:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.812661][ T6240] IPVS: ftp: loaded support on port[0] = 21 04:09:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.971070][ T6243] IPVS: ftp: loaded support on port[0] = 21 [ 2530.035677][ T6246] IPVS: ftp: loaded support on port[0] = 21 [ 2530.059793][ T6248] IPVS: ftp: loaded support on port[0] = 21 04:09:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2530.808773][ T6251] IPVS: ftp: loaded support on port[0] = 21 04:09:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2530.948933][ T6253] IPVS: ftp: loaded support on port[0] = 21 04:09:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2532.016248][ T6255] IPVS: ftp: loaded support on port[0] = 21 04:09:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2532.904395][ T6257] IPVS: ftp: loaded support on port[0] = 21 04:09:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2533.969685][ T6259] IPVS: ftp: loaded support on port[0] = 21 04:09:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2534.953655][ T6261] IPVS: ftp: loaded support on port[0] = 21 04:09:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2535.666418][ T6264] IPVS: ftp: loaded support on port[0] = 21 04:09:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2535.867417][ T6267] IPVS: ftp: loaded support on port[0] = 21 04:09:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2536.404752][ T6270] IPVS: ftp: loaded support on port[0] = 21 [ 2536.549973][ T6276] IPVS: ftp: loaded support on port[0] = 21 [ 2536.557571][ T6275] IPVS: ftp: loaded support on port[0] = 21 04:09:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2536.705851][ T6279] IPVS: ftp: loaded support on port[0] = 21 04:09:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2538.311834][ T6282] IPVS: ftp: loaded support on port[0] = 21 04:09:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2539.360875][ T6284] IPVS: ftp: loaded support on port[0] = 21 04:09:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2540.345134][ T6286] IPVS: ftp: loaded support on port[0] = 21 04:09:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2541.295836][ T6288] IPVS: ftp: loaded support on port[0] = 21 04:09:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2542.152074][ T6291] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2542.476992][ T6294] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2542.850803][ T6299] IPVS: ftp: loaded support on port[0] = 21 [ 2542.957540][ T6300] IPVS: ftp: loaded support on port[0] = 21 [ 2543.028993][ T6304] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x0, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2543.070987][ T6319] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2543.293328][ T6327] IPVS: ftp: loaded support on port[0] = 21 [ 2543.306130][ T6322] IPVS: ftp: loaded support on port[0] = 21 [ 2543.358994][ T6324] IPVS: ftp: loaded support on port[0] = 21 04:09:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x0, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2548.055402][ T6330] IPVS: ftp: loaded support on port[0] = 21 [ 2548.248720][ T6334] IPVS: ftp: loaded support on port[0] = 21 [ 2548.268015][ T6336] IPVS: ftp: loaded support on port[0] = 21 04:09:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2548.765999][ T6338] IPVS: ftp: loaded support on port[0] = 21 04:09:38 executing program 3: r0 = memfd_create(&(0x7f0000000180)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:09:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2549.135627][ T6345] IPVS: ftp: loaded support on port[0] = 21 04:09:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2549.547335][ T6349] IPVS: ftp: loaded support on port[0] = 21 04:09:39 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) epoll_create1(0x0) pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) 04:09:39 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000000)=0x7fff, 0x12) 04:09:39 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xc, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) futex(&(0x7f0000000040), 0x8c, 0x1, 0x0, &(0x7f0000001280), 0x0) 04:09:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00h\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2551.320949][ T6367] device team0 entered promiscuous mode [ 2551.326588][ T6367] device team_slave_0 entered promiscuous mode [ 2551.332873][ T6367] device team_slave_1 entered promiscuous mode [ 2551.363245][ T6367] 8021q: adding VLAN 0 to HW filter on device team0 [ 2551.386600][ T6368] device team0 left promiscuous mode [ 2551.394200][ T6368] device team_slave_0 left promiscuous mode [ 2551.408012][ T6368] device team_slave_1 left promiscuous mode [ 2551.593534][ T6369] device team0 entered promiscuous mode [ 2551.614601][ T6369] device team_slave_0 entered promiscuous mode [ 2551.635345][ T6369] device team_slave_1 entered promiscuous mode [ 2551.661697][ T6369] 8021q: adding VLAN 0 to HW filter on device team0 04:09:41 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r4}], 0x1, &(0x7f0000000500)={0x0, r5+10000000}, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) ioctl$RNDADDENTROPY(r4, 0x40085203, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) lseek(r1, 0x0, 0x1000000003) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x2, 0x200, 0x0, 0x0, 0x5, 0x0, 0x4, 0x1, 0x9, 0x6, 0x4, 0x3f, 0x20, 0x100000000, 0x8, 0x7, 0x7, 0xd8, 0x8, 0xc4, 0x3, 0x8, 0x7f, 0x6, 0x40, 0x76, 0x200, 0x0, 0x0, 0x1, 0x1ff, 0x8, 0x5, 0x6, 0x273, 0x0, 0x100000000, 0x2, @perf_bp={&(0x7f00000000c0), 0x6}, 0x10, 0xb94f, 0x2, 0x5, 0x8, 0x14, 0xffffffffffffffe1}, r6, 0x10, 0xffffffffffffff9c, 0x1) 04:09:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x0, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:42 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) [ 2552.846622][ T6381] IPVS: ftp: loaded support on port[0] = 21 04:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2553.190356][ T6392] IPVS: ftp: loaded support on port[0] = 21 04:09:45 executing program 1: 04:09:45 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 04:09:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:45 executing program 1: 04:09:45 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 04:09:45 executing program 1: 04:09:45 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) [ 2555.571473][ T6400] IPVS: ftp: loaded support on port[0] = 21 [ 2555.646634][ T6405] IPVS: ftp: loaded support on port[0] = 21 [ 2555.684250][ T6409] IPVS: ftp: loaded support on port[0] = 21 04:09:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x0, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:46 executing program 1: 04:09:46 executing program 3: 04:09:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:46 executing program 1: [ 2557.162539][ T6424] IPVS: ftp: loaded support on port[0] = 21 [ 2557.197033][ T6421] IPVS: ftp: loaded support on port[0] = 21 04:09:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:48 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x80000003) r0 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r0, &(0x7f0000000080)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x98) r1 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4004700c, 0x349) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x50070000, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000a40)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000000)={{0x0, 0x8001}, 0x0, 0x9, 0x0, {0x70d, 0x976}, 0x9, 0x20}) [ 2559.128617][ T6431] IPVS: ftp: loaded support on port[0] = 21 [ 2559.211319][ T6430] QAT: Invalid ioctl [ 2559.283587][ T6433] QAT: Invalid ioctl 04:09:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:49 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000004c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0xffffffffffffffff, @random="277a4c148d89", 'bridge_slave_0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'veth0_to_bond\x00'}}) 04:09:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x0, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:49 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x80000003) r0 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r0, &(0x7f0000000080)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x98) r1 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4004700c, 0x349) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x50070000, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000a40)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000000)={{0x0, 0x8001}, 0x0, 0x9, 0x0, {0x70d, 0x976}, 0x9, 0x20}) [ 2559.565124][ T6438] IPVS: ftp: loaded support on port[0] = 21 04:09:49 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x80000003) r0 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r0, &(0x7f0000000080)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x98) r1 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4004700c, 0x349) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x50070000, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000a40)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000000)={{0x0, 0x8001}, 0x0, 0x9, 0x0, {0x70d, 0x976}, 0x9, 0x20}) [ 2559.611155][ T6467] IPVS: ftp: loaded support on port[0] = 21 04:09:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2559.768757][ T6547] QAT: Invalid ioctl [ 2559.861285][ T6546] QAT: Invalid ioctl 04:09:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) [ 2559.964165][ T6550] IPVS: ftp: loaded support on port[0] = 21 04:09:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0f8e"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:09:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x400000000000098, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 2561.346603][ T6665] IPVS: ftp: loaded support on port[0] = 21 [ 2561.375438][ T6663] IPVS: ftp: loaded support on port[0] = 21 [ 2561.417239][ T6667] IPVS: ftp: loaded support on port[0] = 21 04:09:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x0, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2564.174770][ T6672] IPVS: ftp: loaded support on port[0] = 21 [ 2564.218151][ T6677] IPVS: ftp: loaded support on port[0] = 21 [ 2564.228820][ T6674] IPVS: ftp: loaded support on port[0] = 21 04:09:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2566.268184][ T6681] IPVS: ftp: loaded support on port[0] = 21 [ 2566.276296][ T6683] IPVS: ftp: loaded support on port[0] = 21 [ 2566.288203][ T6685] IPVS: ftp: loaded support on port[0] = 21 04:09:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2569.377843][ T6688] IPVS: ftp: loaded support on port[0] = 21 04:09:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x0, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2569.516311][ T6691] IPVS: ftp: loaded support on port[0] = 21 [ 2569.633346][ T6694] IPVS: ftp: loaded support on port[0] = 21 04:10:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2570.527087][ T6697] IPVS: ftp: loaded support on port[0] = 21 04:10:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2571.309558][ T6700] IPVS: ftp: loaded support on port[0] = 21 [ 2571.430755][ T6704] IPVS: ftp: loaded support on port[0] = 21 [ 2571.488449][ T6707] IPVS: ftp: loaded support on port[0] = 21 [ 2571.502742][ T6708] IPVS: ftp: loaded support on port[0] = 21 04:10:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2574.623798][ T6711] IPVS: ftp: loaded support on port[0] = 21 [ 2574.716021][ T6714] IPVS: ftp: loaded support on port[0] = 21 04:10:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2576.733726][ T6719] IPVS: ftp: loaded support on port[0] = 21 [ 2576.748529][ T6718] IPVS: ftp: loaded support on port[0] = 21 [ 2576.789107][ T6722] IPVS: ftp: loaded support on port[0] = 21 [ 2576.958413][ T6725] IPVS: ftp: loaded support on port[0] = 21 04:10:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2580.013573][ T6728] IPVS: ftp: loaded support on port[0] = 21 [ 2580.062319][ T6731] IPVS: ftp: loaded support on port[0] = 21 04:10:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2580.976246][ T6734] IPVS: ftp: loaded support on port[0] = 21 [ 2581.071368][ T6737] IPVS: ftp: loaded support on port[0] = 21 04:10:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2582.115639][ T6739] IPVS: ftp: loaded support on port[0] = 21 04:10:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x0, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2582.297426][ T6742] IPVS: ftp: loaded support on port[0] = 21 [ 2582.410884][ T6768] IPVS: ftp: loaded support on port[0] = 21 [ 2582.457494][ T6771] IPVS: ftp: loaded support on port[0] = 21 04:10:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2586.279275][ T6774] IPVS: ftp: loaded support on port[0] = 21 04:10:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2586.784073][ T6777] IPVS: ftp: loaded support on port[0] = 21 04:10:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2587.189281][ T6780] IPVS: ftp: loaded support on port[0] = 21 04:10:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2587.869063][ T6785] IPVS: ftp: loaded support on port[0] = 21 [ 2587.945504][ T6783] IPVS: ftp: loaded support on port[0] = 21 [ 2588.057053][ T6788] IPVS: ftp: loaded support on port[0] = 21 04:10:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x0, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2588.461264][ T6791] IPVS: ftp: loaded support on port[0] = 21 [ 2588.496477][ T6794] IPVS: ftp: loaded support on port[0] = 21 04:10:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2589.363800][ T6797] IPVS: ftp: loaded support on port[0] = 21 04:10:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2590.315365][ T6800] IPVS: ftp: loaded support on port[0] = 21 04:10:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2592.199148][ T6803] IPVS: ftp: loaded support on port[0] = 21 04:10:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2593.041656][ T6806] IPVS: ftp: loaded support on port[0] = 21 04:10:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2593.847423][ T6809] IPVS: ftp: loaded support on port[0] = 21 [ 2593.861630][ T6811] IPVS: ftp: loaded support on port[0] = 21 04:10:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2594.015436][ T6814] IPVS: ftp: loaded support on port[0] = 21 [ 2594.225728][ T6817] IPVS: ftp: loaded support on port[0] = 21 04:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x0, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2594.687257][ T6820] IPVS: ftp: loaded support on port[0] = 21 04:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x0, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2595.251576][ T6823] IPVS: ftp: loaded support on port[0] = 21 04:10:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2595.971122][ T6826] IPVS: ftp: loaded support on port[0] = 21 04:10:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x0, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2596.216415][ T6829] IPVS: ftp: loaded support on port[0] = 21 04:10:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x0, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2597.152392][ T6832] IPVS: ftp: loaded support on port[0] = 21 04:10:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x0, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2598.024641][ T6835] IPVS: ftp: loaded support on port[0] = 21 04:10:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x0, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2598.927684][ T6838] IPVS: ftp: loaded support on port[0] = 21 04:10:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x0, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2599.737698][ T6840] IPVS: ftp: loaded support on port[0] = 21 [ 2599.951826][ T6843] IPVS: ftp: loaded support on port[0] = 21 04:10:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2600.220173][ T6849] IPVS: ftp: loaded support on port[0] = 21 [ 2600.237633][ T6852] IPVS: ftp: loaded support on port[0] = 21 [ 2600.242864][ T6851] IPVS: ftp: loaded support on port[0] = 21 04:10:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2600.994749][ T6855] IPVS: ftp: loaded support on port[0] = 21 [ 2601.214125][ T6858] IPVS: ftp: loaded support on port[0] = 21 04:10:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x0, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2605.100274][ T6861] IPVS: ftp: loaded support on port[0] = 21 04:10:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x0, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2605.764677][ T6864] IPVS: ftp: loaded support on port[0] = 21 04:10:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2605.858835][ T6866] IPVS: ftp: loaded support on port[0] = 21 [ 2605.912271][ T6869] IPVS: ftp: loaded support on port[0] = 21 [ 2605.997536][ T6872] IPVS: ftp: loaded support on port[0] = 21 04:10:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2606.810234][ T6875] IPVS: ftp: loaded support on port[0] = 21 [ 2606.940498][ T6878] IPVS: ftp: loaded support on port[0] = 21 04:10:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x0, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 04:10:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x40000000000003, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r3, 0x2, 0x2, &(0x7f0000000100)=[{}, {}], 0x0) syz_genetlink_get_family_id$tipc2(0x0) io_destroy(r3) [ 2611.593249][ T6881] IPVS: ftp: loaded support on port[0] = 21 04:10:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mlockall(0x400000000007) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x4) 04:10:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) close(r1) 04:10:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 04:10:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x2c, r1, 0x605, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) [ 2611.954565][ T6998] IPVS: ftp: loaded support on port[0] = 21 04:10:41 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x2000000, 0x11, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x30400, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x100000073) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 04:10:41 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) socket$inet_dccp(0x2, 0x6, 0x0) io_submit(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x81}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x103, 0x6, {0xffff, 0x7fff, 0x9, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0x0, 0x300, 0x44f0f00000000000, [], &(0x7f0000000000)={0x0, 0x0, [], @p_u32=0x0}}) 04:10:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x0, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000580)='ramfs\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0x6, 0x2) chdir(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x7) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x7ffffe, 0x4002011, r2, 0x0) [ 2612.571519][ T26] audit: type=1804 audit(1553573442.253:38): pid=7226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/newroot/2039/file0/bus" dev="ramfs" ino=339517 res=1 [ 2612.662696][ T26] audit: type=1804 audit(1553573442.253:39): pid=7226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/newroot/2039/file0/bus" dev="ramfs" ino=339517 res=1 [ 2612.697036][ T7221] IPVS: ftp: loaded support on port[0] = 21 [ 2612.705074][ T7224] IPVS: ftp: loaded support on port[0] = 21 04:10:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) io_submit(0x0, 0x1, &(0x7f00000009c0)=[&(0x7f0000000980)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000900)="8473212d21863729f7bf05672056f871fca3a81cdb12d24b22d615d3a601fd2012987bfdbdbf86ddf5fb44cca91d359fd05cb2fa13989d6fd5d80e71eecd26e62e7986fd62c94d456818384fbf406ab3cca4795265f5fb32999a6a394d8182dd16c2a3b7bbb84fd61796", 0x6a, 0x1, 0x0, 0x1, r0}]) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x840100000000009) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x81}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x103, 0x6, {0xffff, 0x7fff, 0x9, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000140)={0x0, 0x300, 0x44f0f00000000000, [], &(0x7f0000000000)={0x0, 0x0, [], @p_u32=0x0}}) 04:10:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2612.727570][ T7231] IPVS: ftp: loaded support on port[0] = 21 04:10:42 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) [ 2612.802702][ T26] audit: type=1804 audit(1553573442.283:40): pid=7226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/newroot/2039/file0/bus" dev="ramfs" ino=339517 res=1 04:10:42 executing program 3: r0 = socket(0x2, 0x80003, 0xe7) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2613.002958][ T7334] IPVS: ftp: loaded support on port[0] = 21 04:10:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x400000000007) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x4) 04:10:42 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/11, 0xb, 0xfffffffffffffbfd, 0x8, 0x7, 0x3adb, 0xfff}, 0x120) socket$inet6(0xa, 0x1000000000002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(0x0, 0x800000000000000, 0x81) r2 = gettid() getgid() writev(r1, 0x0, 0x140) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x1c9c380}, {r3, r4+30000000}}, &(0x7f0000000100)) tkill(r2, 0x1004000000016) close(r0) 04:10:43 executing program 3: 04:10:43 executing program 3: 04:10:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:46 executing program 3: 04:10:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:46 executing program 1: 04:10:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x0, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2617.107290][ T7567] IPVS: ftp: loaded support on port[0] = 21 [ 2617.208956][ T7570] IPVS: ftp: loaded support on port[0] = 21 [ 2617.219803][ T7574] IPVS: ftp: loaded support on port[0] = 21 04:10:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:47 executing program 3: 04:10:47 executing program 1: 04:10:47 executing program 1: 04:10:47 executing program 3: [ 2617.611373][ T7580] IPVS: ftp: loaded support on port[0] = 21 04:10:47 executing program 3: 04:10:47 executing program 1: [ 2618.923810][ T5868] BUG: MAX_STACK_TRACE_ENTRIES too low! [ 2618.929383][ T5868] turning off the locking correctness validator. [ 2618.935718][ T5868] CPU: 1 PID: 5868 Comm: kworker/u4:3 Not tainted 5.1.0-rc2 #36 [ 2618.943340][ T5868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.953478][ T5868] Workqueue: netns cleanup_net [ 2618.958227][ T5868] Call Trace: [ 2618.961602][ T5868] dump_stack+0x172/0x1f0 [ 2618.965969][ T5868] save_trace.cold+0x14/0x19 [ 2618.970553][ T5868] check_prev_add.constprop.0+0x8dc/0x23c0 [ 2618.976367][ T5868] ? __save_stack_trace+0x83/0x100 [ 2618.981468][ T5868] ? check_usage+0x570/0x570 [ 2618.986088][ T5868] ? ret_from_fork+0x3a/0x50 [ 2618.990713][ T5868] ? kasan_check_write+0x14/0x20 [ 2618.995644][ T5868] ? graph_lock+0x7b/0x200 [ 2619.000050][ T5868] ? __lockdep_reset_lock+0x450/0x450 [ 2619.005458][ T5868] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.011695][ T5868] __lock_acquire+0x239c/0x3fb0 [ 2619.016540][ T5868] ? mark_held_locks+0xf0/0xf0 [ 2619.021454][ T5868] ? sock_release+0x18/0x20 [ 2619.025951][ T5868] lock_acquire+0x16f/0x3f0 [ 2619.030495][ T5868] ? flush_workqueue+0xf7/0x14c0 [ 2619.035425][ T5868] flush_workqueue+0x126/0x14c0 [ 2619.040268][ T5868] ? flush_workqueue+0xf7/0x14c0 [ 2619.045201][ T5868] ? lock_downgrade+0x880/0x880 [ 2619.050059][ T5868] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 2619.055959][ T5868] ? wait_for_completion+0x440/0x440 [ 2619.061238][ T5868] drain_workqueue+0x1b4/0x470 [ 2619.065989][ T5868] ? drain_workqueue+0x1b4/0x470 [ 2619.070922][ T5868] destroy_workqueue+0x21/0x700 [ 2619.075765][ T5868] ? __sock_release+0x1c3/0x2b0 [ 2619.080685][ T5868] tipc_topsrv_stop+0x40a/0x5e6 [ 2619.085582][ T5868] tipc_exit_net+0x16/0x40 [ 2619.090000][ T5868] ? __tipc_nl_media_set.cold+0x28/0x28 [ 2619.095535][ T5868] ops_exit_list.isra.0+0xb0/0x160 [ 2619.100638][ T5868] cleanup_net+0x3fb/0x960 [ 2619.105043][ T5868] ? netns_install+0x1d0/0x1d0 [ 2619.109806][ T5868] process_one_work+0x98e/0x1790 [ 2619.114748][ T5868] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2619.120194][ T5868] ? lock_acquire+0x16f/0x3f0 [ 2619.124865][ T5868] worker_thread+0x98/0xe40 [ 2619.129421][ T5868] ? trace_hardirqs_on+0x67/0x230 [ 2619.134450][ T5868] kthread+0x357/0x430 [ 2619.138508][ T5868] ? process_one_work+0x1790/0x1790 [ 2619.143696][ T5868] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2619.150023][ T5868] ret_from_fork+0x3a/0x50 04:10:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:49 executing program 3: 04:10:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:49 executing program 1: 04:10:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x0, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:49 executing program 3: [ 2619.650474][ T3875] kobject: 'loop4' (00000000c407e1b2): kobject_uevent_env [ 2619.670250][ T3875] kobject: 'loop4' (00000000c407e1b2): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:10:49 executing program 1: 04:10:49 executing program 3: [ 2619.750401][ T3875] kobject: 'loop0' (000000005c70f8dd): kobject_uevent_env [ 2619.760284][ T7591] IPVS: ftp: loaded support on port[0] = 21 [ 2619.783973][ T7595] IPVS: ftp: loaded support on port[0] = 21 [ 2619.791646][ T7598] IPVS: ftp: loaded support on port[0] = 21 04:10:49 executing program 1: 04:10:49 executing program 3: [ 2619.801175][ T3875] kobject: 'loop0' (000000005c70f8dd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2619.817818][ T7600] IPVS: ftp: loaded support on port[0] = 21 [ 2619.822086][ T7591] kobject: 'lo' (000000007de04519): kobject_add_internal: parent: 'net', set: 'devices' [ 2619.836786][ T3875] kobject: 'loop3' (00000000cd906960): kobject_uevent_env 04:10:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000000), 0x12) [ 2619.871549][ T7591] kobject: 'lo' (000000007de04519): kobject_uevent_env [ 2619.878782][ T3875] kobject: 'loop3' (00000000cd906960): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2619.881427][ T7591] kobject: 'lo' (000000007de04519): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2619.897877][ T3875] kobject: 'loop2' (000000002bed9245): kobject_uevent_env [ 2619.906194][ T3875] kobject: 'loop2' (000000002bed9245): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2619.921849][ T3875] kobject: 'loop3' (00000000cd906960): kobject_uevent_env [ 2619.926822][ T7591] kobject: 'queues' (00000000a24cef30): kobject_add_internal: parent: 'lo', set: '' [ 2619.932533][ T3875] kobject: 'loop3' (00000000cd906960): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2619.941449][ T7591] kobject: 'queues' (00000000a24cef30): kobject_uevent_env [ 2619.963939][ T7591] kobject: 'queues' (00000000a24cef30): kobject_uevent_env: filter function caused the event to drop! [ 2619.977004][ T7591] kobject: 'rx-0' (0000000017bcaa57): kobject_add_internal: parent: 'queues', set: 'queues' [ 2619.990492][ T7591] kobject: 'rx-0' (0000000017bcaa57): kobject_uevent_env [ 2619.998575][ T7591] kobject: 'rx-0' (0000000017bcaa57): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2620.010413][ T7591] kobject: 'tx-0' (0000000069aaef31): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.021005][ T7591] kobject: 'tx-0' (0000000069aaef31): kobject_uevent_env [ 2620.028507][ T7591] kobject: 'tx-0' (0000000069aaef31): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2620.041116][ T7595] kobject: 'lo' (000000009044e54c): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.053301][ T7595] kobject: 'lo' (000000009044e54c): kobject_uevent_env [ 2620.060335][ T7595] kobject: 'lo' (000000009044e54c): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2620.070081][ T7595] kobject: 'queues' (000000001ba05def): kobject_add_internal: parent: 'lo', set: '' [ 2620.080046][ T7595] kobject: 'queues' (000000001ba05def): kobject_uevent_env [ 2620.087577][ T7595] kobject: 'queues' (000000001ba05def): kobject_uevent_env: filter function caused the event to drop! [ 2620.098600][ T7595] kobject: 'rx-0' (00000000fb2062ae): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.108819][ T7595] kobject: 'rx-0' (00000000fb2062ae): kobject_uevent_env [ 2620.115936][ T7595] kobject: 'rx-0' (00000000fb2062ae): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2620.126805][ T7595] kobject: 'tx-0' (00000000b57ec878): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.137177][ T7595] kobject: 'tx-0' (00000000b57ec878): kobject_uevent_env [ 2620.144320][ T7595] kobject: 'tx-0' (00000000b57ec878): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2620.156985][ T7598] kobject: 'lo' (0000000088ce3d90): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.168726][ T7598] kobject: 'lo' (0000000088ce3d90): kobject_uevent_env [ 2620.176158][ T7598] kobject: 'lo' (0000000088ce3d90): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2620.186947][ T7598] kobject: 'queues' (00000000ddd0533e): kobject_add_internal: parent: 'lo', set: '' [ 2620.197260][ T7598] kobject: 'queues' (00000000ddd0533e): kobject_uevent_env [ 2620.204606][ T7598] kobject: 'queues' (00000000ddd0533e): kobject_uevent_env: filter function caused the event to drop! [ 2620.215650][ T7598] kobject: 'rx-0' (00000000874dbad2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.225901][ T7598] kobject: 'rx-0' (00000000874dbad2): kobject_uevent_env [ 2620.233108][ T7598] kobject: 'rx-0' (00000000874dbad2): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2620.247733][ T7598] kobject: 'tx-0' (0000000095c42599): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.258159][ T7598] kobject: 'tx-0' (0000000095c42599): kobject_uevent_env [ 2620.265307][ T7598] kobject: 'tx-0' (0000000095c42599): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2620.278081][ T7598] kobject: 'tunl0' (00000000a3e791ed): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.289565][ T7598] kobject: 'tunl0' (00000000a3e791ed): kobject_uevent_env [ 2620.296868][ T7598] kobject: 'tunl0' (00000000a3e791ed): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2620.307277][ T7598] kobject: 'queues' (00000000b66a3dbd): kobject_add_internal: parent: 'tunl0', set: '' [ 2620.317626][ T7598] kobject: 'queues' (00000000b66a3dbd): kobject_uevent_env [ 2620.324885][ T7598] kobject: 'queues' (00000000b66a3dbd): kobject_uevent_env: filter function caused the event to drop! [ 2620.335972][ T7598] kobject: 'rx-0' (00000000c6db4d12): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.346309][ T7598] kobject: 'rx-0' (00000000c6db4d12): kobject_uevent_env [ 2620.353470][ T7598] kobject: 'rx-0' (00000000c6db4d12): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2620.364692][ T7598] kobject: 'tx-0' (00000000ad9c89c4): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.375243][ T7598] kobject: 'tx-0' (00000000ad9c89c4): kobject_uevent_env [ 2620.382366][ T7598] kobject: 'tx-0' (00000000ad9c89c4): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2620.395222][ T7600] kobject: 'lo' (00000000b0f8a823): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.407077][ T7600] kobject: 'lo' (00000000b0f8a823): kobject_uevent_env [ 2620.414215][ T7600] kobject: 'lo' (00000000b0f8a823): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2620.424455][ T7600] kobject: 'queues' (00000000a7a15b7d): kobject_add_internal: parent: 'lo', set: '' [ 2620.434818][ T7600] kobject: 'queues' (00000000a7a15b7d): kobject_uevent_env [ 2620.442154][ T7600] kobject: 'queues' (00000000a7a15b7d): kobject_uevent_env: filter function caused the event to drop! [ 2620.453299][ T7600] kobject: 'rx-0' (0000000044ef6f77): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.463748][ T7600] kobject: 'rx-0' (0000000044ef6f77): kobject_uevent_env [ 2620.470910][ T7600] kobject: 'rx-0' (0000000044ef6f77): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2620.481913][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.492274][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): kobject_uevent_env [ 2620.499462][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2620.512478][ T7600] kobject: 'tunl0' (00000000bc35c63f): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.524295][ T7600] kobject: 'tunl0' (00000000bc35c63f): kobject_uevent_env [ 2620.531500][ T7600] kobject: 'tunl0' (00000000bc35c63f): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2620.545383][ T7600] kobject: 'queues' (000000009c72fc9f): kobject_add_internal: parent: 'tunl0', set: '' [ 2620.555641][ T7600] kobject: 'queues' (000000009c72fc9f): kobject_uevent_env [ 2620.562821][ T7600] kobject: 'queues' (000000009c72fc9f): kobject_uevent_env: filter function caused the event to drop! [ 2620.573802][ T7600] kobject: 'rx-0' (00000000cbce226d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.583933][ T7600] kobject: 'rx-0' (00000000cbce226d): kobject_uevent_env [ 2620.590964][ T7600] kobject: 'rx-0' (00000000cbce226d): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2620.601995][ T7600] kobject: 'tx-0' (000000007cb3bc73): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.612180][ T7600] kobject: 'tx-0' (000000007cb3bc73): kobject_uevent_env [ 2620.619279][ T7600] kobject: 'tx-0' (000000007cb3bc73): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2620.631706][ T7591] kobject: 'tunl0' (00000000d0a311fb): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.643069][ T7591] kobject: 'tunl0' (00000000d0a311fb): kobject_uevent_env [ 2620.650233][ T7591] kobject: 'tunl0' (00000000d0a311fb): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2620.660327][ T7591] kobject: 'queues' (0000000022efabc2): kobject_add_internal: parent: 'tunl0', set: '' [ 2620.670559][ T7591] kobject: 'queues' (0000000022efabc2): kobject_uevent_env [ 2620.677770][ T7591] kobject: 'queues' (0000000022efabc2): kobject_uevent_env: filter function caused the event to drop! [ 2620.688752][ T7591] kobject: 'rx-0' (0000000081230206): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.698886][ T7591] kobject: 'rx-0' (0000000081230206): kobject_uevent_env [ 2620.706046][ T7591] kobject: 'rx-0' (0000000081230206): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2620.717076][ T7591] kobject: 'tx-0' (00000000468c36c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.727276][ T7591] kobject: 'tx-0' (00000000468c36c7): kobject_uevent_env [ 2620.734338][ T7591] kobject: 'tx-0' (00000000468c36c7): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2620.746171][ T7591] kobject: 'gre0' (000000004f9ccfa8): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.756671][ T7591] kobject: 'gre0' (000000004f9ccfa8): kobject_uevent_env [ 2620.763761][ T7591] kobject: 'gre0' (000000004f9ccfa8): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2620.773685][ T7591] kobject: 'queues' (000000008e8f3f76): kobject_add_internal: parent: 'gre0', set: '' [ 2620.783837][ T7591] kobject: 'queues' (000000008e8f3f76): kobject_uevent_env [ 2620.791010][ T7591] kobject: 'queues' (000000008e8f3f76): kobject_uevent_env: filter function caused the event to drop! [ 2620.801998][ T7591] kobject: 'rx-0' (000000007c2c7266): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.812116][ T7591] kobject: 'rx-0' (000000007c2c7266): kobject_uevent_env [ 2620.819198][ T7591] kobject: 'rx-0' (000000007c2c7266): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2620.830232][ T7591] kobject: 'tx-0' (00000000f3b85781): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.840441][ T7591] kobject: 'tx-0' (00000000f3b85781): kobject_uevent_env [ 2620.847509][ T7591] kobject: 'tx-0' (00000000f3b85781): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2620.859090][ T7595] kobject: 'tunl0' (00000000382cdc2d): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.870662][ T7595] kobject: 'tunl0' (00000000382cdc2d): kobject_uevent_env [ 2620.878189][ T7595] kobject: 'tunl0' (00000000382cdc2d): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2620.888660][ T7595] kobject: 'queues' (000000006905cef9): kobject_add_internal: parent: 'tunl0', set: '' [ 2620.898841][ T7595] kobject: 'queues' (000000006905cef9): kobject_uevent_env [ 2620.906048][ T7595] kobject: 'queues' (000000006905cef9): kobject_uevent_env: filter function caused the event to drop! [ 2620.917002][ T7595] kobject: 'rx-0' (000000001471e269): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.927120][ T7595] kobject: 'rx-0' (000000001471e269): kobject_uevent_env [ 2620.934208][ T7595] kobject: 'rx-0' (000000001471e269): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2620.945271][ T7595] kobject: 'tx-0' (0000000058500b03): kobject_add_internal: parent: 'queues', set: 'queues' [ 2620.955414][ T7595] kobject: 'tx-0' (0000000058500b03): kobject_uevent_env [ 2620.962428][ T7595] kobject: 'tx-0' (0000000058500b03): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2620.974089][ T7595] kobject: 'gre0' (000000003b77073a): kobject_add_internal: parent: 'net', set: 'devices' [ 2620.984405][ T7595] kobject: 'gre0' (000000003b77073a): kobject_uevent_env [ 2620.991434][ T7595] kobject: 'gre0' (000000003b77073a): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2621.001324][ T7595] kobject: 'queues' (000000008842dd87): kobject_add_internal: parent: 'gre0', set: '' [ 2621.011615][ T7595] kobject: 'queues' (000000008842dd87): kobject_uevent_env [ 2621.018826][ T7595] kobject: 'queues' (000000008842dd87): kobject_uevent_env: filter function caused the event to drop! [ 2621.029776][ T7595] kobject: 'rx-0' (0000000007927297): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.039889][ T7595] kobject: 'rx-0' (0000000007927297): kobject_uevent_env [ 2621.046963][ T7595] kobject: 'rx-0' (0000000007927297): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2621.057886][ T7595] kobject: 'tx-0' (00000000823c5c63): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.068050][ T7595] kobject: 'tx-0' (00000000823c5c63): kobject_uevent_env [ 2621.075171][ T7595] kobject: 'tx-0' (00000000823c5c63): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2621.086688][ T7598] kobject: 'gre0' (00000000f4899406): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.098311][ T7598] kobject: 'gre0' (00000000f4899406): kobject_uevent_env [ 2621.105373][ T7598] kobject: 'gre0' (00000000f4899406): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2621.115327][ T7598] kobject: 'queues' (00000000277d7210): kobject_add_internal: parent: 'gre0', set: '' [ 2621.125434][ T7598] kobject: 'queues' (00000000277d7210): kobject_uevent_env [ 2621.132616][ T7598] kobject: 'queues' (00000000277d7210): kobject_uevent_env: filter function caused the event to drop! [ 2621.143602][ T7598] kobject: 'rx-0' (00000000b40b5859): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.153751][ T7598] kobject: 'rx-0' (00000000b40b5859): kobject_uevent_env [ 2621.160790][ T7598] kobject: 'rx-0' (00000000b40b5859): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2621.171742][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.181906][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): kobject_uevent_env [ 2621.189001][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2621.200494][ T7600] kobject: 'gre0' (00000000fe181479): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.210878][ T7600] kobject: 'gre0' (00000000fe181479): kobject_uevent_env [ 2621.217962][ T7600] kobject: 'gre0' (00000000fe181479): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2621.227868][ T7600] kobject: 'queues' (00000000e70fc4a9): kobject_add_internal: parent: 'gre0', set: '' [ 2621.237956][ T7600] kobject: 'queues' (00000000e70fc4a9): kobject_uevent_env [ 2621.245174][ T7600] kobject: 'queues' (00000000e70fc4a9): kobject_uevent_env: filter function caused the event to drop! [ 2621.256235][ T7600] kobject: 'rx-0' (000000003b7029a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.266377][ T7600] kobject: 'rx-0' (000000003b7029a4): kobject_uevent_env [ 2621.273555][ T7600] kobject: 'rx-0' (000000003b7029a4): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2621.284519][ T7600] kobject: 'tx-0' (00000000d3afb330): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.295205][ T7600] kobject: 'tx-0' (00000000d3afb330): kobject_uevent_env [ 2621.302266][ T7600] kobject: 'tx-0' (00000000d3afb330): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2621.313869][ T7600] kobject: 'gretap0' (00000000503201a4): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.324604][ T7600] kobject: 'gretap0' (00000000503201a4): kobject_uevent_env [ 2621.331906][ T7600] kobject: 'gretap0' (00000000503201a4): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2621.344343][ T7600] kobject: 'queues' (00000000794af9fe): kobject_add_internal: parent: 'gretap0', set: '' [ 2621.354724][ T7600] kobject: 'queues' (00000000794af9fe): kobject_uevent_env [ 2621.361919][ T7600] kobject: 'queues' (00000000794af9fe): kobject_uevent_env: filter function caused the event to drop! [ 2621.372935][ T7600] kobject: 'rx-0' (0000000012ff7007): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.383064][ T7600] kobject: 'rx-0' (0000000012ff7007): kobject_uevent_env [ 2621.390101][ T7600] kobject: 'rx-0' (0000000012ff7007): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2621.401344][ T7600] kobject: 'tx-0' (00000000f5cfb4db): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.411551][ T7600] kobject: 'tx-0' (00000000f5cfb4db): kobject_uevent_env [ 2621.419539][ T7600] kobject: 'tx-0' (00000000f5cfb4db): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2621.431295][ T7600] kobject: 'batman_adv' (0000000069559578): kobject_add_internal: parent: 'gretap0', set: '' [ 2621.442619][ T7591] kobject: 'gretap0' (000000008ff1182a): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.454683][ T7591] kobject: 'gretap0' (000000008ff1182a): kobject_uevent_env [ 2621.462184][ T7591] kobject: 'gretap0' (000000008ff1182a): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2621.472778][ T7591] kobject: 'queues' (000000004fc47ebf): kobject_add_internal: parent: 'gretap0', set: '' [ 2621.483212][ T7591] kobject: 'queues' (000000004fc47ebf): kobject_uevent_env [ 2621.490411][ T7591] kobject: 'queues' (000000004fc47ebf): kobject_uevent_env: filter function caused the event to drop! [ 2621.501383][ T7591] kobject: 'rx-0' (000000004b869068): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.511543][ T7591] kobject: 'rx-0' (000000004b869068): kobject_uevent_env [ 2621.518618][ T7591] kobject: 'rx-0' (000000004b869068): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2621.529802][ T7591] kobject: 'tx-0' (00000000cd46a34b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.539982][ T7591] kobject: 'tx-0' (00000000cd46a34b): kobject_uevent_env [ 2621.547065][ T7591] kobject: 'tx-0' (00000000cd46a34b): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2621.558705][ T7591] kobject: 'batman_adv' (0000000008082a62): kobject_add_internal: parent: 'gretap0', set: '' [ 2621.569931][ T7591] kobject: 'erspan0' (00000000b78d7783): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.580522][ T7591] kobject: 'erspan0' (00000000b78d7783): kobject_uevent_env [ 2621.587888][ T7591] kobject: 'erspan0' (00000000b78d7783): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2621.598307][ T7591] kobject: 'queues' (0000000064de069f): kobject_add_internal: parent: 'erspan0', set: '' [ 2621.608687][ T7591] kobject: 'queues' (0000000064de069f): kobject_uevent_env [ 2621.615906][ T7591] kobject: 'queues' (0000000064de069f): kobject_uevent_env: filter function caused the event to drop! [ 2621.626889][ T7591] kobject: 'rx-0' (000000007fed9fee): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.637034][ T7591] kobject: 'rx-0' (000000007fed9fee): kobject_uevent_env [ 2621.644139][ T7591] kobject: 'rx-0' (000000007fed9fee): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2621.655350][ T7591] kobject: 'tx-0' (00000000279c984e): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.665862][ T7591] kobject: 'tx-0' (00000000279c984e): kobject_uevent_env [ 2621.673034][ T7591] kobject: 'tx-0' (00000000279c984e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2621.684782][ T7591] kobject: 'batman_adv' (00000000dd64b82a): kobject_add_internal: parent: 'erspan0', set: '' [ 2621.696015][ T7591] kobject: 'ip_vti0' (0000000023f92a34): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.706607][ T7591] kobject: 'ip_vti0' (0000000023f92a34): kobject_uevent_env [ 2621.713945][ T7591] kobject: 'ip_vti0' (0000000023f92a34): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2621.724412][ T7591] kobject: 'queues' (000000000e7f7b11): kobject_add_internal: parent: 'ip_vti0', set: '' [ 2621.734796][ T7591] kobject: 'queues' (000000000e7f7b11): kobject_uevent_env [ 2621.741982][ T7591] kobject: 'queues' (000000000e7f7b11): kobject_uevent_env: filter function caused the event to drop! [ 2621.753022][ T7591] kobject: 'rx-0' (00000000905ff5f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.763189][ T7591] kobject: 'rx-0' (00000000905ff5f9): kobject_uevent_env [ 2621.770236][ T7591] kobject: 'rx-0' (00000000905ff5f9): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2621.781486][ T7591] kobject: 'tx-0' (0000000072140af0): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.791699][ T7591] kobject: 'tx-0' (0000000072140af0): kobject_uevent_env [ 2621.798783][ T7591] kobject: 'tx-0' (0000000072140af0): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2621.810591][ T7595] kobject: 'gretap0' (000000002c14c44d): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.822685][ T7595] kobject: 'gretap0' (000000002c14c44d): kobject_uevent_env [ 2621.830178][ T7595] kobject: 'gretap0' (000000002c14c44d): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2621.840702][ T7595] kobject: 'queues' (00000000a893a2be): kobject_add_internal: parent: 'gretap0', set: '' [ 2621.851110][ T7595] kobject: 'queues' (00000000a893a2be): kobject_uevent_env [ 2621.858350][ T7595] kobject: 'queues' (00000000a893a2be): kobject_uevent_env: filter function caused the event to drop! [ 2621.869342][ T7595] kobject: 'rx-0' (00000000d9b99f39): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.879481][ T7595] kobject: 'rx-0' (00000000d9b99f39): kobject_uevent_env [ 2621.886546][ T7595] kobject: 'rx-0' (00000000d9b99f39): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2621.897750][ T7595] kobject: 'tx-0' (00000000bbf72778): kobject_add_internal: parent: 'queues', set: 'queues' [ 2621.908008][ T7595] kobject: 'tx-0' (00000000bbf72778): kobject_uevent_env [ 2621.915103][ T7595] kobject: 'tx-0' (00000000bbf72778): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2621.926772][ T7595] kobject: 'batman_adv' (00000000d102bce1): kobject_add_internal: parent: 'gretap0', set: '' [ 2621.938032][ T7598] kobject: 'gretap0' (0000000089abb487): kobject_add_internal: parent: 'net', set: 'devices' [ 2621.949124][ T7598] kobject: 'gretap0' (0000000089abb487): kobject_uevent_env [ 2621.956583][ T7598] kobject: 'gretap0' (0000000089abb487): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2621.967013][ T7598] kobject: 'queues' (000000004b577065): kobject_add_internal: parent: 'gretap0', set: '' [ 2621.977360][ T7598] kobject: 'queues' (000000004b577065): kobject_uevent_env [ 2621.984579][ T7598] kobject: 'queues' (000000004b577065): kobject_uevent_env: filter function caused the event to drop! [ 2621.995548][ T7598] kobject: 'rx-0' (000000005cf7f1ff): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.005662][ T7598] kobject: 'rx-0' (000000005cf7f1ff): kobject_uevent_env [ 2622.012694][ T7598] kobject: 'rx-0' (000000005cf7f1ff): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2622.023891][ T7598] kobject: 'tx-0' (000000008af89530): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.034040][ T7598] kobject: 'tx-0' (000000008af89530): kobject_uevent_env [ 2622.041253][ T7598] kobject: 'tx-0' (000000008af89530): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2622.052977][ T7598] kobject: 'batman_adv' (000000002f80e7d5): kobject_add_internal: parent: 'gretap0', set: '' [ 2622.064234][ T7600] kobject: 'erspan0' (0000000068568862): kobject_add_internal: parent: 'net', set: 'devices' [ 2622.075338][ T7600] kobject: 'erspan0' (0000000068568862): kobject_uevent_env [ 2622.082731][ T7600] kobject: 'erspan0' (0000000068568862): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2622.093505][ T7600] kobject: 'queues' (00000000cfc1183a): kobject_add_internal: parent: 'erspan0', set: '' [ 2622.104010][ T7600] kobject: 'queues' (00000000cfc1183a): kobject_uevent_env [ 2622.111250][ T7600] kobject: 'queues' (00000000cfc1183a): kobject_uevent_env: filter function caused the event to drop! [ 2622.122307][ T7600] kobject: 'rx-0' (00000000e01c528b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.132432][ T7600] kobject: 'rx-0' (00000000e01c528b): kobject_uevent_env [ 2622.139598][ T7600] kobject: 'rx-0' (00000000e01c528b): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2622.150791][ T7600] kobject: 'tx-0' (000000006ad623dc): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.161003][ T7600] kobject: 'tx-0' (000000006ad623dc): kobject_uevent_env [ 2622.168076][ T7600] kobject: 'tx-0' (000000006ad623dc): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2622.179786][ T7600] kobject: 'batman_adv' (00000000149eb00f): kobject_add_internal: parent: 'erspan0', set: '' [ 2622.191001][ T7600] kobject: 'ip_vti0' (0000000070459983): kobject_add_internal: parent: 'net', set: 'devices' [ 2622.201843][ T7600] kobject: 'ip_vti0' (0000000070459983): kobject_uevent_env [ 2622.209312][ T7600] kobject: 'ip_vti0' (0000000070459983): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2622.219870][ T7600] kobject: 'queues' (00000000fa7f2b8f): kobject_add_internal: parent: 'ip_vti0', set: '' [ 2622.230372][ T7600] kobject: 'queues' (00000000fa7f2b8f): kobject_uevent_env [ 2622.237740][ T7600] kobject: 'queues' (00000000fa7f2b8f): kobject_uevent_env: filter function caused the event to drop! [ 2622.252664][ T7600] kobject: 'rx-0' (00000000fda497ae): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.262947][ T7600] kobject: 'rx-0' (00000000fda497ae): kobject_uevent_env [ 2622.270069][ T7600] kobject: 'rx-0' (00000000fda497ae): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2622.281279][ T7600] kobject: 'tx-0' (00000000c6cd1ced): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.292395][ T7600] kobject: 'tx-0' (00000000c6cd1ced): kobject_uevent_env [ 2622.299627][ T7600] kobject: 'tx-0' (00000000c6cd1ced): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2622.311976][ T7591] kobject: 'rx-0' (00000000905ff5f9): kobject_cleanup, parent 000000000e7f7b11 [ 2622.320957][ T7591] kobject: 'rx-0' (00000000905ff5f9): auto cleanup 'remove' event [ 2622.328812][ T7591] kobject: 'rx-0' (00000000905ff5f9): kobject_uevent_env [ 2622.335871][ T7591] kobject: 'rx-0' (00000000905ff5f9): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2622.347142][ T7591] kobject: 'rx-0' (00000000905ff5f9): auto cleanup kobject_del [ 2622.354908][ T7591] kobject: 'rx-0' (00000000905ff5f9): calling ktype release [ 2622.362178][ T7591] kobject: 'rx-0': free name [ 2622.366831][ T7591] kobject: 'tx-0' (0000000072140af0): kobject_cleanup, parent 000000000e7f7b11 [ 2622.375781][ T7591] kobject: 'tx-0' (0000000072140af0): auto cleanup 'remove' event [ 2622.383618][ T7591] kobject: 'tx-0' (0000000072140af0): kobject_uevent_env [ 2622.390664][ T7591] kobject: 'tx-0' (0000000072140af0): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2622.401838][ T7591] kobject: 'tx-0' (0000000072140af0): auto cleanup kobject_del [ 2622.409413][ T7591] kobject: 'tx-0' (0000000072140af0): calling ktype release [ 2622.416766][ T7591] kobject: 'tx-0': free name [ 2622.421361][ T7591] kobject: 'queues' (000000000e7f7b11): kobject_cleanup, parent (null) [ 2622.430477][ T7591] kobject: 'queues' (000000000e7f7b11): calling ktype release [ 2622.437939][ T7591] kobject: 'queues' (000000000e7f7b11): kset_release [ 2622.444643][ T7591] kobject: 'queues': free name [ 2622.449664][ T7591] kobject: 'ip_vti0' (0000000023f92a34): kobject_uevent_env [ 2622.457001][ T7591] kobject: 'ip_vti0' (0000000023f92a34): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2622.467855][ T7595] kobject: 'erspan0' (00000000badfc359): kobject_add_internal: parent: 'net', set: 'devices' [ 2622.478762][ T7595] kobject: 'erspan0' (00000000badfc359): kobject_uevent_env [ 2622.486207][ T7595] kobject: 'erspan0' (00000000badfc359): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2622.496663][ T7595] kobject: 'queues' (0000000095e77e50): kobject_add_internal: parent: 'erspan0', set: '' [ 2622.507015][ T7595] kobject: 'queues' (0000000095e77e50): kobject_uevent_env [ 2622.514253][ T7595] kobject: 'queues' (0000000095e77e50): kobject_uevent_env: filter function caused the event to drop! [ 2622.525426][ T7595] kobject: 'rx-0' (00000000497bc864): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.535549][ T7595] kobject: 'rx-0' (00000000497bc864): kobject_uevent_env [ 2622.542598][ T7595] kobject: 'rx-0' (00000000497bc864): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2622.553853][ T7595] kobject: 'tx-0' (0000000087caa925): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.564074][ T7595] kobject: 'tx-0' (0000000087caa925): kobject_uevent_env [ 2622.571103][ T7595] kobject: 'tx-0' (0000000087caa925): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2622.582810][ T7595] kobject: 'batman_adv' (000000004b0818f4): kobject_add_internal: parent: 'erspan0', set: '' [ 2622.594208][ T7595] kobject: 'ip_vti0' (00000000b4c8a0ac): kobject_add_internal: parent: 'net', set: 'devices' [ 2622.604876][ T7595] kobject: 'ip_vti0' (00000000b4c8a0ac): kobject_uevent_env [ 2622.612187][ T7595] kobject: 'ip_vti0' (00000000b4c8a0ac): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2622.622640][ T7595] kobject: 'queues' (00000000049e6023): kobject_add_internal: parent: 'ip_vti0', set: '' [ 2622.634656][ T7595] kobject: 'queues' (00000000049e6023): kobject_uevent_env [ 2622.641858][ T7595] kobject: 'queues' (00000000049e6023): kobject_uevent_env: filter function caused the event to drop! [ 2622.652845][ T7595] kobject: 'rx-0' (0000000052700d49): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.663001][ T7595] kobject: 'rx-0' (0000000052700d49): kobject_uevent_env [ 2622.670051][ T7595] kobject: 'rx-0' (0000000052700d49): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2622.681285][ T7595] kobject: 'tx-0' (000000003e215ecf): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.691496][ T7595] kobject: 'tx-0' (000000003e215ecf): kobject_uevent_env [ 2622.698586][ T7595] kobject: 'tx-0' (000000003e215ecf): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2622.710395][ T7598] kobject: 'erspan0' (00000000c223374d): kobject_add_internal: parent: 'net', set: 'devices' [ 2622.722495][ T7598] kobject: 'erspan0' (00000000c223374d): kobject_uevent_env [ 2622.729988][ T7598] kobject: 'erspan0' (00000000c223374d): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2622.740601][ T7598] kobject: 'queues' (000000009dab48ee): kobject_add_internal: parent: 'erspan0', set: '' [ 2622.751045][ T7598] kobject: 'queues' (000000009dab48ee): kobject_uevent_env [ 2622.758289][ T7598] kobject: 'queues' (000000009dab48ee): kobject_uevent_env: filter function caused the event to drop! [ 2622.769307][ T7598] kobject: 'rx-0' (00000000a255eb16): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.779430][ T7598] kobject: 'rx-0' (00000000a255eb16): kobject_uevent_env [ 2622.786582][ T7598] kobject: 'rx-0' (00000000a255eb16): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2622.797772][ T7598] kobject: 'tx-0' (00000000de60ac07): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.807973][ T7598] kobject: 'tx-0' (00000000de60ac07): kobject_uevent_env [ 2622.815062][ T7598] kobject: 'tx-0' (00000000de60ac07): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2622.826780][ T7598] kobject: 'batman_adv' (000000005b48cbe5): kobject_add_internal: parent: 'erspan0', set: '' [ 2622.837922][ T7598] kobject: 'ip_vti0' (000000008fb45ead): kobject_add_internal: parent: 'net', set: 'devices' [ 2622.848604][ T7598] kobject: 'ip_vti0' (000000008fb45ead): kobject_uevent_env [ 2622.855928][ T7598] kobject: 'ip_vti0' (000000008fb45ead): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2622.866380][ T7598] kobject: 'queues' (00000000a8a24fab): kobject_add_internal: parent: 'ip_vti0', set: '' [ 2622.876742][ T7598] kobject: 'queues' (00000000a8a24fab): kobject_uevent_env [ 2622.883963][ T7598] kobject: 'queues' (00000000a8a24fab): kobject_uevent_env: filter function caused the event to drop! [ 2622.894942][ T7598] kobject: 'rx-0' (00000000a7eec322): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.905080][ T7598] kobject: 'rx-0' (00000000a7eec322): kobject_uevent_env [ 2622.912123][ T7598] kobject: 'rx-0' (00000000a7eec322): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2622.923345][ T7598] kobject: 'tx-0' (0000000034c0c89e): kobject_add_internal: parent: 'queues', set: 'queues' [ 2622.933564][ T7598] kobject: 'tx-0' (0000000034c0c89e): kobject_uevent_env [ 2622.940622][ T7598] kobject: 'tx-0' (0000000034c0c89e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2622.954097][ T7600] kobject: 'rx-0' (00000000fda497ae): kobject_cleanup, parent 00000000fa7f2b8f [ 2622.964441][ T7600] kobject: 'rx-0' (00000000fda497ae): auto cleanup 'remove' event [ 2622.972226][ T7600] kobject: 'rx-0' (00000000fda497ae): kobject_uevent_env [ 2622.979348][ T7600] kobject: 'rx-0' (00000000fda497ae): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2622.990728][ T7600] kobject: 'rx-0' (00000000fda497ae): auto cleanup kobject_del [ 2623.000231][ T7600] kobject: 'rx-0' (00000000fda497ae): calling ktype release [ 2623.007556][ T7600] kobject: 'rx-0': free name [ 2623.012172][ T7600] kobject: 'tx-0' (00000000c6cd1ced): kobject_cleanup, parent 00000000fa7f2b8f [ 2623.021378][ T7600] kobject: 'tx-0' (00000000c6cd1ced): auto cleanup 'remove' event [ 2623.029205][ T7600] kobject: 'tx-0' (00000000c6cd1ced): kobject_uevent_env [ 2623.036323][ T7600] kobject: 'tx-0' (00000000c6cd1ced): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2623.047506][ T7600] kobject: 'tx-0' (00000000c6cd1ced): auto cleanup kobject_del [ 2623.055088][ T7600] kobject: 'tx-0' (00000000c6cd1ced): calling ktype release [ 2623.062338][ T7600] kobject: 'tx-0': free name [ 2623.066959][ T7600] kobject: 'queues' (00000000fa7f2b8f): kobject_cleanup, parent (null) [ 2623.076085][ T7600] kobject: 'queues' (00000000fa7f2b8f): calling ktype release [ 2623.083551][ T7600] kobject: 'queues' (00000000fa7f2b8f): kset_release [ 2623.090214][ T7600] kobject: 'queues': free name [ 2623.095261][ T7600] kobject: 'ip_vti0' (0000000070459983): kobject_uevent_env [ 2623.102552][ T7600] kobject: 'ip_vti0' (0000000070459983): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2623.113097][ T7591] kobject: 'ip_vti0' (0000000023f92a34): kobject_cleanup, parent (null) [ 2623.122329][ T7591] kobject: 'ip_vti0' (0000000023f92a34): calling ktype release [ 2623.129957][ T7591] kobject: 'ip_vti0': free name [ 2623.135273][ T7595] kobject: 'rx-0' (0000000052700d49): kobject_cleanup, parent 00000000049e6023 [ 2623.144501][ T7595] kobject: 'rx-0' (0000000052700d49): auto cleanup 'remove' event [ 2623.152305][ T7595] kobject: 'rx-0' (0000000052700d49): kobject_uevent_env [ 2623.159474][ T7595] kobject: 'rx-0' (0000000052700d49): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2623.170690][ T7595] kobject: 'rx-0' (0000000052700d49): auto cleanup kobject_del [ 2623.178322][ T7595] kobject: 'rx-0' (0000000052700d49): calling ktype release [ 2623.185608][ T7595] kobject: 'rx-0': free name [ 2623.190237][ T7595] kobject: 'tx-0' (000000003e215ecf): kobject_cleanup, parent 00000000049e6023 [ 2623.199178][ T7595] kobject: 'tx-0' (000000003e215ecf): auto cleanup 'remove' event [ 2623.206990][ T7595] kobject: 'tx-0' (000000003e215ecf): kobject_uevent_env [ 2623.214056][ T7595] kobject: 'tx-0' (000000003e215ecf): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2623.225209][ T7595] kobject: 'tx-0' (000000003e215ecf): auto cleanup kobject_del [ 2623.232747][ T7595] kobject: 'tx-0' (000000003e215ecf): calling ktype release [ 2623.240054][ T7595] kobject: 'tx-0': free name [ 2623.244682][ T7595] kobject: 'queues' (00000000049e6023): kobject_cleanup, parent (null) [ 2623.253822][ T7595] kobject: 'queues' (00000000049e6023): calling ktype release [ 2623.261265][ T7595] kobject: 'queues' (00000000049e6023): kset_release [ 2623.267993][ T7595] kobject: 'queues': free name [ 2623.273053][ T7595] kobject: 'ip_vti0' (00000000b4c8a0ac): kobject_uevent_env [ 2623.280358][ T7595] kobject: 'ip_vti0' (00000000b4c8a0ac): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2623.291688][ T7598] kobject: 'rx-0' (00000000a7eec322): kobject_cleanup, parent 00000000a8a24fab [ 2623.301488][ T7598] kobject: 'rx-0' (00000000a7eec322): auto cleanup 'remove' event [ 2623.309319][ T7598] kobject: 'rx-0' (00000000a7eec322): kobject_uevent_env [ 2623.316391][ T7598] kobject: 'rx-0' (00000000a7eec322): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2623.327555][ T7598] kobject: 'rx-0' (00000000a7eec322): auto cleanup kobject_del [ 2623.335143][ T7598] kobject: 'rx-0' (00000000a7eec322): calling ktype release [ 2623.342415][ T7598] kobject: 'rx-0': free name [ 2623.347090][ T7598] kobject: 'tx-0' (0000000034c0c89e): kobject_cleanup, parent 00000000a8a24fab [ 2623.356040][ T7598] kobject: 'tx-0' (0000000034c0c89e): auto cleanup 'remove' event [ 2623.363856][ T7598] kobject: 'tx-0' (0000000034c0c89e): kobject_uevent_env [ 2623.370894][ T7598] kobject: 'tx-0' (0000000034c0c89e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2623.382085][ T7598] kobject: 'tx-0' (0000000034c0c89e): auto cleanup kobject_del [ 2623.389685][ T7598] kobject: 'tx-0' (0000000034c0c89e): calling ktype release [ 2623.396972][ T7598] kobject: 'tx-0': free name [ 2623.401559][ T7598] kobject: 'queues' (00000000a8a24fab): kobject_cleanup, parent (null) [ 2623.410671][ T7598] kobject: 'queues' (00000000a8a24fab): calling ktype release [ 2623.418323][ T7598] kobject: 'queues' (00000000a8a24fab): kset_release [ 2623.425039][ T7598] kobject: 'queues': free name [ 2623.430005][ T7598] kobject: 'ip_vti0' (000000008fb45ead): kobject_uevent_env [ 2623.437572][ T7598] kobject: 'ip_vti0' (000000008fb45ead): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2623.448777][ T7591] kobject: 'batman_adv' (00000000dd64b82a): kobject_uevent_env [ 2623.456379][ T7591] kobject: 'batman_adv' (00000000dd64b82a): kobject_uevent_env: filter function caused the event to drop! [ 2623.468302][ T7591] kobject: 'batman_adv' (00000000dd64b82a): kobject_cleanup, parent (null) [ 2623.477779][ T7591] kobject: 'batman_adv' (00000000dd64b82a): calling ktype release [ 2623.485608][ T7591] kobject: (00000000dd64b82a): dynamic_kobj_release [ 2623.492179][ T7591] kobject: 'batman_adv': free name [ 2623.497472][ T7591] kobject: 'rx-0' (000000007fed9fee): kobject_cleanup, parent 0000000064de069f [ 2623.506585][ T7591] kobject: 'rx-0' (000000007fed9fee): auto cleanup 'remove' event [ 2623.514416][ T7591] kobject: 'rx-0' (000000007fed9fee): kobject_uevent_env [ 2623.521459][ T7591] kobject: 'rx-0' (000000007fed9fee): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2623.532772][ T7591] kobject: 'rx-0' (000000007fed9fee): auto cleanup kobject_del [ 2623.540463][ T7591] kobject: 'rx-0' (000000007fed9fee): calling ktype release [ 2623.547917][ T7591] kobject: 'rx-0': free name [ 2623.552527][ T7591] kobject: 'tx-0' (00000000279c984e): kobject_cleanup, parent 0000000064de069f [ 2623.561507][ T7591] kobject: 'tx-0' (00000000279c984e): auto cleanup 'remove' event [ 2623.569355][ T7591] kobject: 'tx-0' (00000000279c984e): kobject_uevent_env [ 2623.576414][ T7591] kobject: 'tx-0' (00000000279c984e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2623.587594][ T7591] kobject: 'tx-0' (00000000279c984e): auto cleanup kobject_del [ 2623.595187][ T7591] kobject: 'tx-0' (00000000279c984e): calling ktype release [ 2623.602451][ T7591] kobject: 'tx-0': free name [ 2623.607073][ T7591] kobject: 'queues' (0000000064de069f): kobject_cleanup, parent (null) [ 2623.616185][ T7591] kobject: 'queues' (0000000064de069f): calling ktype release [ 2623.623647][ T7591] kobject: 'queues' (0000000064de069f): kset_release [ 2623.630306][ T7591] kobject: 'queues': free name [ 2623.635335][ T7591] kobject: 'erspan0' (00000000b78d7783): kobject_uevent_env [ 2623.642648][ T7591] kobject: 'erspan0' (00000000b78d7783): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2623.653175][ T7600] kobject: 'ip_vti0' (0000000070459983): kobject_cleanup, parent (null) [ 2623.653325][ T7595] kobject: 'ip_vti0' (00000000b4c8a0ac): kobject_cleanup, parent (null) [ 2623.662363][ T7600] kobject: 'ip_vti0' (0000000070459983): calling ktype release [ 2623.671764][ T7598] kobject: 'ip_vti0' (000000008fb45ead): kobject_cleanup, parent (null) [ 2623.688673][ T7600] kobject: 'ip_vti0': free name [ 2623.690589][ T7598] kobject: 'ip_vti0' (000000008fb45ead): calling ktype release [ 2623.693607][ T7595] kobject: 'ip_vti0' (00000000b4c8a0ac): calling ktype release [ 2623.701225][ T7598] kobject: 'ip_vti0': free name [ 2623.708728][ T7595] kobject: 'ip_vti0': free name [ 2623.719101][ T7600] kobject: 'batman_adv' (00000000149eb00f): kobject_uevent_env [ 2623.726715][ T7600] kobject: 'batman_adv' (00000000149eb00f): kobject_uevent_env: filter function caused the event to drop! [ 2623.738220][ T7600] kobject: 'batman_adv' (00000000149eb00f): kobject_cleanup, parent (null) [ 2623.747724][ T7600] kobject: 'batman_adv' (00000000149eb00f): calling ktype release [ 2623.755554][ T7600] kobject: (00000000149eb00f): dynamic_kobj_release [ 2623.762152][ T7600] kobject: 'batman_adv': free name [ 2623.767457][ T7600] kobject: 'rx-0' (00000000e01c528b): kobject_cleanup, parent 00000000cfc1183a [ 2623.776396][ T7600] kobject: 'rx-0' (00000000e01c528b): auto cleanup 'remove' event [ 2623.784287][ T7600] kobject: 'rx-0' (00000000e01c528b): kobject_uevent_env [ 2623.791326][ T7600] kobject: 'rx-0' (00000000e01c528b): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2623.802503][ T7600] kobject: 'rx-0' (00000000e01c528b): auto cleanup kobject_del [ 2623.810072][ T7600] kobject: 'rx-0' (00000000e01c528b): calling ktype release [ 2623.817684][ T7600] kobject: 'rx-0': free name [ 2623.822284][ T7600] kobject: 'tx-0' (000000006ad623dc): kobject_cleanup, parent 00000000cfc1183a [ 2623.831229][ T7600] kobject: 'tx-0' (000000006ad623dc): auto cleanup 'remove' event [ 2623.839130][ T7600] kobject: 'tx-0' (000000006ad623dc): kobject_uevent_env [ 2623.846207][ T7600] kobject: 'tx-0' (000000006ad623dc): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2623.857487][ T7600] kobject: 'tx-0' (000000006ad623dc): auto cleanup kobject_del [ 2623.865073][ T7600] kobject: 'tx-0' (000000006ad623dc): calling ktype release [ 2623.872346][ T7600] kobject: 'tx-0': free name [ 2623.876973][ T7600] kobject: 'queues' (00000000cfc1183a): kobject_cleanup, parent (null) [ 2623.886110][ T7600] kobject: 'queues' (00000000cfc1183a): calling ktype release [ 2623.893592][ T7600] kobject: 'queues' (00000000cfc1183a): kset_release [ 2623.900347][ T7600] kobject: 'queues': free name [ 2623.905515][ T7600] kobject: 'erspan0' (0000000068568862): kobject_uevent_env [ 2623.913027][ T7600] kobject: 'erspan0' (0000000068568862): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2623.924281][ T7598] kobject: 'batman_adv' (000000005b48cbe5): kobject_uevent_env [ 2623.931810][ T7598] kobject: 'batman_adv' (000000005b48cbe5): kobject_uevent_env: filter function caused the event to drop! [ 2623.943409][ T7598] kobject: 'batman_adv' (000000005b48cbe5): kobject_cleanup, parent (null) [ 2623.952844][ T7598] kobject: 'batman_adv' (000000005b48cbe5): calling ktype release [ 2623.960691][ T7598] kobject: (000000005b48cbe5): dynamic_kobj_release [ 2623.967294][ T7598] kobject: 'batman_adv': free name [ 2623.972493][ T7598] kobject: 'rx-0' (00000000a255eb16): kobject_cleanup, parent 000000009dab48ee [ 2623.981440][ T7598] kobject: 'rx-0' (00000000a255eb16): auto cleanup 'remove' event [ 2623.989322][ T7598] kobject: 'rx-0' (00000000a255eb16): kobject_uevent_env [ 2623.996395][ T7598] kobject: 'rx-0' (00000000a255eb16): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2624.007658][ T7598] kobject: 'rx-0' (00000000a255eb16): auto cleanup kobject_del [ 2624.015237][ T7598] kobject: 'rx-0' (00000000a255eb16): calling ktype release [ 2624.022509][ T7598] kobject: 'rx-0': free name [ 2624.027178][ T7598] kobject: 'tx-0' (00000000de60ac07): kobject_cleanup, parent 000000009dab48ee [ 2624.036623][ T7598] kobject: 'tx-0' (00000000de60ac07): auto cleanup 'remove' event [ 2624.044430][ T7598] kobject: 'tx-0' (00000000de60ac07): kobject_uevent_env [ 2624.051469][ T7598] kobject: 'tx-0' (00000000de60ac07): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2624.062650][ T7598] kobject: 'tx-0' (00000000de60ac07): auto cleanup kobject_del [ 2624.070224][ T7598] kobject: 'tx-0' (00000000de60ac07): calling ktype release [ 2624.077751][ T7598] kobject: 'tx-0': free name [ 2624.082334][ T7598] kobject: 'queues' (000000009dab48ee): kobject_cleanup, parent (null) [ 2624.091449][ T7598] kobject: 'queues' (000000009dab48ee): calling ktype release [ 2624.098955][ T7598] kobject: 'queues' (000000009dab48ee): kset_release [ 2624.105637][ T7598] kobject: 'queues': free name [ 2624.110597][ T7598] kobject: 'erspan0' (00000000c223374d): kobject_uevent_env [ 2624.117953][ T7598] kobject: 'erspan0' (00000000c223374d): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2624.129169][ T7595] kobject: 'batman_adv' (000000004b0818f4): kobject_uevent_env [ 2624.136790][ T7595] kobject: 'batman_adv' (000000004b0818f4): kobject_uevent_env: filter function caused the event to drop! [ 2624.148118][ T7595] kobject: 'batman_adv' (000000004b0818f4): kobject_cleanup, parent (null) [ 2624.157593][ T7595] kobject: 'batman_adv' (000000004b0818f4): calling ktype release [ 2624.165399][ T7595] kobject: (000000004b0818f4): dynamic_kobj_release [ 2624.171971][ T7595] kobject: 'batman_adv': free name [ 2624.177273][ T7595] kobject: 'rx-0' (00000000497bc864): kobject_cleanup, parent 0000000095e77e50 [ 2624.186218][ T7595] kobject: 'rx-0' (00000000497bc864): auto cleanup 'remove' event [ 2624.194032][ T7595] kobject: 'rx-0' (00000000497bc864): kobject_uevent_env [ 2624.201065][ T7595] kobject: 'rx-0' (00000000497bc864): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2624.212281][ T7595] kobject: 'rx-0' (00000000497bc864): auto cleanup kobject_del [ 2624.219855][ T7595] kobject: 'rx-0' (00000000497bc864): calling ktype release [ 2624.227172][ T7595] kobject: 'rx-0': free name [ 2624.231785][ T7595] kobject: 'tx-0' (0000000087caa925): kobject_cleanup, parent 0000000095e77e50 [ 2624.240737][ T7595] kobject: 'tx-0' (0000000087caa925): auto cleanup 'remove' event [ 2624.248558][ T7595] kobject: 'tx-0' (0000000087caa925): kobject_uevent_env [ 2624.255651][ T7595] kobject: 'tx-0' (0000000087caa925): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2624.266810][ T7595] kobject: 'tx-0' (0000000087caa925): auto cleanup kobject_del [ 2624.274413][ T7595] kobject: 'tx-0' (0000000087caa925): calling ktype release [ 2624.281682][ T7595] kobject: 'tx-0': free name [ 2624.286325][ T7595] kobject: 'queues' (0000000095e77e50): kobject_cleanup, parent (null) [ 2624.295541][ T7595] kobject: 'queues' (0000000095e77e50): calling ktype release [ 2624.303120][ T7595] kobject: 'queues' (0000000095e77e50): kset_release [ 2624.309813][ T7595] kobject: 'queues': free name [ 2624.314927][ T7595] kobject: 'erspan0' (00000000badfc359): kobject_uevent_env [ 2624.322226][ T7595] kobject: 'erspan0' (00000000badfc359): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2624.332795][ T7591] kobject: 'erspan0' (00000000b78d7783): kobject_cleanup, parent (null) [ 2624.342110][ T7591] kobject: 'erspan0' (00000000b78d7783): calling ktype release [ 2624.342129][ T7600] kobject: 'erspan0' (0000000068568862): kobject_cleanup, parent (null) [ 2624.349682][ T7591] kobject: 'erspan0': free name [ 2624.358892][ T7598] kobject: 'erspan0' (00000000c223374d): kobject_cleanup, parent (null) [ 2624.372976][ T7600] kobject: 'erspan0' (0000000068568862): calling ktype release [ 2624.373194][ T7598] kobject: 'erspan0' (00000000c223374d): calling ktype release [ 2624.380617][ T7600] kobject: 'erspan0': free name [ 2624.388561][ T7598] kobject: 'erspan0': free name [ 2624.398678][ T7591] kobject: 'batman_adv' (0000000008082a62): kobject_uevent_env [ 2624.406342][ T7591] kobject: 'batman_adv' (0000000008082a62): kobject_uevent_env: filter function caused the event to drop! [ 2624.418944][ T7591] kobject: 'batman_adv' (0000000008082a62): kobject_cleanup, parent (null) [ 2624.428445][ T7591] kobject: 'batman_adv' (0000000008082a62): calling ktype release [ 2624.436488][ T7591] kobject: (0000000008082a62): dynamic_kobj_release [ 2624.443145][ T7591] kobject: 'batman_adv': free name [ 2624.448366][ T7591] kobject: 'rx-0' (000000004b869068): kobject_cleanup, parent 000000004fc47ebf [ 2624.457337][ T7591] kobject: 'rx-0' (000000004b869068): auto cleanup 'remove' event [ 2624.465208][ T7591] kobject: 'rx-0' (000000004b869068): kobject_uevent_env [ 2624.472265][ T7591] kobject: 'rx-0' (000000004b869068): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2624.483475][ T7591] kobject: 'rx-0' (000000004b869068): auto cleanup kobject_del [ 2624.491033][ T7591] kobject: 'rx-0' (000000004b869068): calling ktype release [ 2624.498349][ T7591] kobject: 'rx-0': free name [ 2624.502987][ T7591] kobject: 'tx-0' (00000000cd46a34b): kobject_cleanup, parent 000000004fc47ebf [ 2624.511915][ T7591] kobject: 'tx-0' (00000000cd46a34b): auto cleanup 'remove' event [ 2624.519738][ T7591] kobject: 'tx-0' (00000000cd46a34b): kobject_uevent_env [ 2624.526835][ T7591] kobject: 'tx-0' (00000000cd46a34b): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2624.538028][ T7591] kobject: 'tx-0' (00000000cd46a34b): auto cleanup kobject_del [ 2624.545646][ T7591] kobject: 'tx-0' (00000000cd46a34b): calling ktype release [ 2624.552944][ T7591] kobject: 'tx-0': free name [ 2624.557550][ T7591] kobject: 'queues' (000000004fc47ebf): kobject_cleanup, parent (null) [ 2624.566715][ T7591] kobject: 'queues' (000000004fc47ebf): calling ktype release [ 2624.574181][ T7591] kobject: 'queues' (000000004fc47ebf): kset_release [ 2624.580826][ T7591] kobject: 'queues': free name [ 2624.585910][ T7591] kobject: 'gretap0' (000000008ff1182a): kobject_uevent_env [ 2624.593230][ T7591] kobject: 'gretap0' (000000008ff1182a): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2624.604642][ T7600] kobject: 'batman_adv' (0000000069559578): kobject_uevent_env [ 2624.612190][ T7600] kobject: 'batman_adv' (0000000069559578): kobject_uevent_env: filter function caused the event to drop! [ 2624.624375][ T7600] kobject: 'batman_adv' (0000000069559578): kobject_cleanup, parent (null) [ 2624.633881][ T7600] kobject: 'batman_adv' (0000000069559578): calling ktype release [ 2624.641671][ T7600] kobject: (0000000069559578): dynamic_kobj_release [ 2624.648287][ T7600] kobject: 'batman_adv': free name [ 2624.653577][ T7600] kobject: 'rx-0' (0000000012ff7007): kobject_cleanup, parent 00000000794af9fe [ 2624.662571][ T7600] kobject: 'rx-0' (0000000012ff7007): auto cleanup 'remove' event [ 2624.670413][ T7600] kobject: 'rx-0' (0000000012ff7007): kobject_uevent_env [ 2624.677478][ T7600] kobject: 'rx-0' (0000000012ff7007): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2624.688656][ T7600] kobject: 'rx-0' (0000000012ff7007): auto cleanup kobject_del [ 2624.696235][ T7600] kobject: 'rx-0' (0000000012ff7007): calling ktype release [ 2624.703546][ T7600] kobject: 'rx-0': free name [ 2624.708154][ T7600] kobject: 'tx-0' (00000000f5cfb4db): kobject_cleanup, parent 00000000794af9fe [ 2624.717111][ T7600] kobject: 'tx-0' (00000000f5cfb4db): auto cleanup 'remove' event [ 2624.724927][ T7600] kobject: 'tx-0' (00000000f5cfb4db): kobject_uevent_env [ 2624.731965][ T7600] kobject: 'tx-0' (00000000f5cfb4db): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2624.743256][ T7600] kobject: 'tx-0' (00000000f5cfb4db): auto cleanup kobject_del [ 2624.750807][ T7600] kobject: 'tx-0' (00000000f5cfb4db): calling ktype release [ 2624.758115][ T7600] kobject: 'tx-0': free name [ 2624.762706][ T7600] kobject: 'queues' (00000000794af9fe): kobject_cleanup, parent (null) [ 2624.771849][ T7600] kobject: 'queues' (00000000794af9fe): calling ktype release [ 2624.779428][ T7600] kobject: 'queues' (00000000794af9fe): kset_release [ 2624.786163][ T7600] kobject: 'queues': free name [ 2624.791138][ T7600] kobject: 'gretap0' (00000000503201a4): kobject_uevent_env [ 2624.798478][ T7600] kobject: 'gretap0' (00000000503201a4): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2624.809686][ T7598] kobject: 'batman_adv' (000000002f80e7d5): kobject_uevent_env [ 2624.817293][ T7598] kobject: 'batman_adv' (000000002f80e7d5): kobject_uevent_env: filter function caused the event to drop! [ 2624.828665][ T7598] kobject: 'batman_adv' (000000002f80e7d5): kobject_cleanup, parent (null) [ 2624.838132][ T7598] kobject: 'batman_adv' (000000002f80e7d5): calling ktype release [ 2624.845944][ T7598] kobject: (000000002f80e7d5): dynamic_kobj_release [ 2624.852519][ T7598] kobject: 'batman_adv': free name [ 2624.857795][ T7598] kobject: 'rx-0' (000000005cf7f1ff): kobject_cleanup, parent 000000004b577065 [ 2624.866742][ T7598] kobject: 'rx-0' (000000005cf7f1ff): auto cleanup 'remove' event [ 2624.874557][ T7598] kobject: 'rx-0' (000000005cf7f1ff): kobject_uevent_env [ 2624.881609][ T7598] kobject: 'rx-0' (000000005cf7f1ff): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2624.892788][ T7598] kobject: 'rx-0' (000000005cf7f1ff): auto cleanup kobject_del [ 2624.900546][ T7598] kobject: 'rx-0' (000000005cf7f1ff): calling ktype release [ 2624.907856][ T7598] kobject: 'rx-0': free name [ 2624.912466][ T7598] kobject: 'tx-0' (000000008af89530): kobject_cleanup, parent 000000004b577065 [ 2624.921554][ T7598] kobject: 'tx-0' (000000008af89530): auto cleanup 'remove' event [ 2624.929399][ T7598] kobject: 'tx-0' (000000008af89530): kobject_uevent_env [ 2624.936476][ T7598] kobject: 'tx-0' (000000008af89530): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2624.947694][ T7598] kobject: 'tx-0' (000000008af89530): auto cleanup kobject_del [ 2624.955318][ T7598] kobject: 'tx-0' (000000008af89530): calling ktype release [ 2624.962576][ T7598] kobject: 'tx-0': free name [ 2624.967246][ T7598] kobject: 'queues' (000000004b577065): kobject_cleanup, parent (null) [ 2624.976359][ T7598] kobject: 'queues' (000000004b577065): calling ktype release [ 2624.984094][ T7598] kobject: 'queues' (000000004b577065): kset_release [ 2624.990787][ T7598] kobject: 'queues': free name [ 2624.995855][ T7598] kobject: 'gretap0' (0000000089abb487): kobject_uevent_env [ 2625.003183][ T7598] kobject: 'gretap0' (0000000089abb487): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2625.013783][ T7595] kobject: 'erspan0' (00000000badfc359): kobject_cleanup, parent (null) [ 2625.023109][ T7591] kobject: 'gretap0' (000000008ff1182a): kobject_cleanup, parent (null) [ 2625.024540][ T7595] kobject: 'erspan0' (00000000badfc359): calling ktype release [ 2625.032309][ T7591] kobject: 'gretap0' (000000008ff1182a): calling ktype release [ 2625.040591][ T7600] kobject: 'gretap0' (00000000503201a4): kobject_cleanup, parent (null) [ 2625.048139][ T7591] kobject: 'gretap0': free name [ 2625.059099][ T7598] kobject: 'gretap0' (0000000089abb487): kobject_cleanup, parent (null) [ 2625.063179][ T7595] kobject: 'erspan0': free name [ 2625.070959][ T7598] kobject: 'gretap0' (0000000089abb487): calling ktype release [ 2625.076198][ T7600] kobject: 'gretap0' (00000000503201a4): calling ktype release [ 2625.083395][ T7598] kobject: 'gretap0': free name [ 2625.092956][ T7600] kobject: 'gretap0': free name [ 2625.101107][ T7591] kobject: 'rx-0' (000000007c2c7266): kobject_cleanup, parent 000000008e8f3f76 [ 2625.110099][ T7591] kobject: 'rx-0' (000000007c2c7266): auto cleanup 'remove' event [ 2625.117956][ T7591] kobject: 'rx-0' (000000007c2c7266): kobject_uevent_env [ 2625.125013][ T7591] kobject: 'rx-0' (000000007c2c7266): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2625.135929][ T7591] kobject: 'rx-0' (000000007c2c7266): auto cleanup kobject_del [ 2625.143502][ T7591] kobject: 'rx-0' (000000007c2c7266): calling ktype release [ 2625.150755][ T7591] kobject: 'rx-0': free name [ 2625.155392][ T7591] kobject: 'tx-0' (00000000f3b85781): kobject_cleanup, parent 000000008e8f3f76 [ 2625.164602][ T7591] kobject: 'tx-0' (00000000f3b85781): auto cleanup 'remove' event [ 2625.172708][ T7591] kobject: 'tx-0' (00000000f3b85781): kobject_uevent_env [ 2625.179844][ T7591] kobject: 'tx-0' (00000000f3b85781): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2625.190842][ T7591] kobject: 'tx-0' (00000000f3b85781): auto cleanup kobject_del [ 2625.198471][ T7591] kobject: 'tx-0' (00000000f3b85781): calling ktype release [ 2625.205950][ T7591] kobject: 'tx-0': free name [ 2625.211588][ T7591] kobject: 'queues' (000000008e8f3f76): kobject_cleanup, parent (null) [ 2625.220826][ T7591] kobject: 'queues' (000000008e8f3f76): calling ktype release [ 2625.228395][ T7591] kobject: 'queues' (000000008e8f3f76): kset_release [ 2625.235160][ T7591] kobject: 'queues': free name [ 2625.240953][ T7591] kobject: 'gre0' (000000004f9ccfa8): kobject_uevent_env [ 2625.248621][ T7591] kobject: 'gre0' (000000004f9ccfa8): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2625.259292][ T7595] kobject: 'batman_adv' (00000000d102bce1): kobject_uevent_env [ 2625.266909][ T7595] kobject: 'batman_adv' (00000000d102bce1): kobject_uevent_env: filter function caused the event to drop! [ 2625.278247][ T7595] kobject: 'batman_adv' (00000000d102bce1): kobject_cleanup, parent (null) [ 2625.287714][ T7595] kobject: 'batman_adv' (00000000d102bce1): calling ktype release [ 2625.296107][ T7595] kobject: (00000000d102bce1): dynamic_kobj_release [ 2625.302725][ T7595] kobject: 'batman_adv': free name [ 2625.308010][ T7595] kobject: 'rx-0' (00000000d9b99f39): kobject_cleanup, parent 00000000a893a2be [ 2625.316961][ T7595] kobject: 'rx-0' (00000000d9b99f39): auto cleanup 'remove' event [ 2625.324768][ T7595] kobject: 'rx-0' (00000000d9b99f39): kobject_uevent_env [ 2625.331804][ T7595] kobject: 'rx-0' (00000000d9b99f39): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2625.342994][ T7595] kobject: 'rx-0' (00000000d9b99f39): auto cleanup kobject_del [ 2625.350591][ T7595] kobject: 'rx-0' (00000000d9b99f39): calling ktype release [ 2625.357892][ T7595] kobject: 'rx-0': free name [ 2625.362494][ T7595] kobject: 'tx-0' (00000000bbf72778): kobject_cleanup, parent 00000000a893a2be [ 2625.371436][ T7595] kobject: 'tx-0' (00000000bbf72778): auto cleanup 'remove' event [ 2625.379340][ T7595] kobject: 'tx-0' (00000000bbf72778): kobject_uevent_env [ 2625.386402][ T7595] kobject: 'tx-0' (00000000bbf72778): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2625.397556][ T7595] kobject: 'tx-0' (00000000bbf72778): auto cleanup kobject_del [ 2625.405158][ T7595] kobject: 'tx-0' (00000000bbf72778): calling ktype release [ 2625.412422][ T7595] kobject: 'tx-0': free name [ 2625.417197][ T7595] kobject: 'queues' (00000000a893a2be): kobject_cleanup, parent (null) [ 2625.426460][ T7595] kobject: 'queues' (00000000a893a2be): calling ktype release [ 2625.433944][ T7595] kobject: 'queues' (00000000a893a2be): kset_release [ 2625.440606][ T7595] kobject: 'queues': free name [ 2625.445680][ T7595] kobject: 'gretap0' (000000002c14c44d): kobject_uevent_env [ 2625.453004][ T7595] kobject: 'gretap0' (000000002c14c44d): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2625.465005][ T7598] kobject: 'rx-0' (00000000b40b5859): kobject_cleanup, parent 00000000277d7210 [ 2625.473995][ T7598] kobject: 'rx-0' (00000000b40b5859): auto cleanup 'remove' event [ 2625.481788][ T7598] kobject: 'rx-0' (00000000b40b5859): kobject_uevent_env [ 2625.488895][ T7598] kobject: 'rx-0' (00000000b40b5859): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2625.499802][ T7598] kobject: 'rx-0' (00000000b40b5859): auto cleanup kobject_del [ 2625.507477][ T7598] kobject: 'rx-0' (00000000b40b5859): calling ktype release [ 2625.514784][ T7598] kobject: 'rx-0': free name [ 2625.519400][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): kobject_cleanup, parent 00000000277d7210 [ 2625.528348][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): auto cleanup 'remove' event [ 2625.536156][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): kobject_uevent_env [ 2625.543230][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2625.554134][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): auto cleanup kobject_del [ 2625.561672][ T7598] kobject: 'tx-0' (00000000e9f3b1d8): calling ktype release [ 2625.568968][ T7598] kobject: 'tx-0': free name [ 2625.573608][ T7598] kobject: 'queues' (00000000277d7210): kobject_cleanup, parent (null) [ 2625.582695][ T7598] kobject: 'queues' (00000000277d7210): calling ktype release [ 2625.590178][ T7598] kobject: 'queues' (00000000277d7210): kset_release [ 2625.596882][ T7598] kobject: 'queues': free name [ 2625.601848][ T7598] kobject: 'gre0' (00000000f4899406): kobject_uevent_env [ 2625.608929][ T7598] kobject: 'gre0' (00000000f4899406): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2625.619463][ T7600] kobject: 'rx-0' (000000003b7029a4): kobject_cleanup, parent 00000000e70fc4a9 [ 2625.628649][ T7600] kobject: 'rx-0' (000000003b7029a4): auto cleanup 'remove' event [ 2625.636487][ T7600] kobject: 'rx-0' (000000003b7029a4): kobject_uevent_env [ 2625.643601][ T7600] kobject: 'rx-0' (000000003b7029a4): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2625.654622][ T7600] kobject: 'rx-0' (000000003b7029a4): auto cleanup kobject_del [ 2625.662181][ T7600] kobject: 'rx-0' (000000003b7029a4): calling ktype release [ 2625.670218][ T7600] kobject: 'rx-0': free name [ 2625.674907][ T7600] kobject: 'tx-0' (00000000d3afb330): kobject_cleanup, parent 00000000e70fc4a9 [ 2625.684161][ T7600] kobject: 'tx-0' (00000000d3afb330): auto cleanup 'remove' event [ 2625.691949][ T7600] kobject: 'tx-0' (00000000d3afb330): kobject_uevent_env [ 2625.699064][ T7600] kobject: 'tx-0' (00000000d3afb330): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2625.709994][ T7600] kobject: 'tx-0' (00000000d3afb330): auto cleanup kobject_del [ 2625.717575][ T7600] kobject: 'tx-0' (00000000d3afb330): calling ktype release [ 2625.724855][ T7600] kobject: 'tx-0': free name [ 2625.729438][ T7600] kobject: 'queues' (00000000e70fc4a9): kobject_cleanup, parent (null) [ 2625.738647][ T7600] kobject: 'queues' (00000000e70fc4a9): calling ktype release [ 2625.746115][ T7600] kobject: 'queues' (00000000e70fc4a9): kset_release [ 2625.752767][ T7600] kobject: 'queues': free name [ 2625.757829][ T7600] kobject: 'gre0' (00000000fe181479): kobject_uevent_env [ 2625.764871][ T7600] kobject: 'gre0' (00000000fe181479): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2625.774854][ T7591] kobject: 'gre0' (000000004f9ccfa8): kobject_cleanup, parent (null) [ 2625.774930][ T7595] kobject: 'gretap0' (000000002c14c44d): kobject_cleanup, parent (null) [ 2625.783848][ T7591] kobject: 'gre0' (000000004f9ccfa8): calling ktype release [ 2625.793063][ T7598] kobject: 'gre0' (00000000f4899406): kobject_cleanup, parent (null) [ 2625.800323][ T7591] kobject: 'gre0': free name [ 2625.811596][ T7598] kobject: 'gre0' (00000000f4899406): calling ktype release [ 2625.814226][ T7595] kobject: 'gretap0' (000000002c14c44d): calling ktype release [ 2625.821218][ T7598] kobject: 'gre0': free name [ 2625.828876][ T7595] kobject: 'gretap0': free name [ 2625.838683][ T7591] kobject: 'rx-0' (0000000081230206): kobject_cleanup, parent 0000000022efabc2 [ 2625.847731][ T7591] kobject: 'rx-0' (0000000081230206): auto cleanup 'remove' event [ 2625.855586][ T7591] kobject: 'rx-0' (0000000081230206): kobject_uevent_env [ 2625.862641][ T7591] kobject: 'rx-0' (0000000081230206): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2625.873658][ T7591] kobject: 'rx-0' (0000000081230206): auto cleanup kobject_del [ 2625.881203][ T7591] kobject: 'rx-0' (0000000081230206): calling ktype release [ 2625.888559][ T7591] kobject: 'rx-0': free name [ 2625.893229][ T7591] kobject: 'tx-0' (00000000468c36c7): kobject_cleanup, parent 0000000022efabc2 [ 2625.902159][ T7591] kobject: 'tx-0' (00000000468c36c7): auto cleanup 'remove' event [ 2625.909999][ T7591] kobject: 'tx-0' (00000000468c36c7): kobject_uevent_env [ 2625.917048][ T7591] kobject: 'tx-0' (00000000468c36c7): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2625.928032][ T7591] kobject: 'tx-0' (00000000468c36c7): auto cleanup kobject_del [ 2625.935603][ T7591] kobject: 'tx-0' (00000000468c36c7): calling ktype release [ 2625.942899][ T7591] kobject: 'tx-0': free name [ 2625.947506][ T7591] kobject: 'queues' (0000000022efabc2): kobject_cleanup, parent (null) [ 2625.956903][ T7591] kobject: 'queues' (0000000022efabc2): calling ktype release [ 2625.964388][ T7591] kobject: 'queues' (0000000022efabc2): kset_release [ 2625.971054][ T7591] kobject: 'queues': free name [ 2625.976187][ T7591] kobject: 'tunl0' (00000000d0a311fb): kobject_uevent_env [ 2625.983416][ T7591] kobject: 'tunl0' (00000000d0a311fb): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2625.994270][ T7598] kobject: 'rx-0' (00000000c6db4d12): kobject_cleanup, parent 00000000b66a3dbd [ 2626.003222][ T7598] kobject: 'rx-0' (00000000c6db4d12): auto cleanup 'remove' event [ 2626.010998][ T7598] kobject: 'rx-0' (00000000c6db4d12): kobject_uevent_env [ 2626.018053][ T7598] kobject: 'rx-0' (00000000c6db4d12): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2626.029050][ T7598] kobject: 'rx-0' (00000000c6db4d12): auto cleanup kobject_del [ 2626.036624][ T7598] kobject: 'rx-0' (00000000c6db4d12): calling ktype release [ 2626.043908][ T7598] kobject: 'rx-0': free name [ 2626.048501][ T7598] kobject: 'tx-0' (00000000ad9c89c4): kobject_cleanup, parent 00000000b66a3dbd [ 2626.057436][ T7598] kobject: 'tx-0' (00000000ad9c89c4): auto cleanup 'remove' event [ 2626.065301][ T7598] kobject: 'tx-0' (00000000ad9c89c4): kobject_uevent_env [ 2626.072388][ T7598] kobject: 'tx-0' (00000000ad9c89c4): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2626.083640][ T7598] kobject: 'tx-0' (00000000ad9c89c4): auto cleanup kobject_del [ 2626.091185][ T7598] kobject: 'tx-0' (00000000ad9c89c4): calling ktype release [ 2626.098579][ T7598] kobject: 'tx-0': free name [ 2626.103222][ T7598] kobject: 'queues' (00000000b66a3dbd): kobject_cleanup, parent (null) [ 2626.112311][ T7598] kobject: 'queues' (00000000b66a3dbd): calling ktype release [ 2626.119885][ T7598] kobject: 'queues' (00000000b66a3dbd): kset_release [ 2626.126589][ T7598] kobject: 'queues': free name [ 2626.131572][ T7598] kobject: 'tunl0' (00000000a3e791ed): kobject_uevent_env [ 2626.138842][ T7598] kobject: 'tunl0' (00000000a3e791ed): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2626.151765][ T7595] kobject: 'rx-0' (0000000007927297): kobject_cleanup, parent 000000008842dd87 [ 2626.160782][ T7595] kobject: 'rx-0' (0000000007927297): auto cleanup 'remove' event [ 2626.168633][ T7595] kobject: 'rx-0' (0000000007927297): kobject_uevent_env [ 2626.175694][ T7595] kobject: 'rx-0' (0000000007927297): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2626.186632][ T7595] kobject: 'rx-0' (0000000007927297): auto cleanup kobject_del [ 2626.194199][ T7595] kobject: 'rx-0' (0000000007927297): calling ktype release [ 2626.201449][ T7595] kobject: 'rx-0': free name [ 2626.206087][ T7595] kobject: 'tx-0' (00000000823c5c63): kobject_cleanup, parent 000000008842dd87 [ 2626.215026][ T7595] kobject: 'tx-0' (00000000823c5c63): auto cleanup 'remove' event [ 2626.222801][ T7595] kobject: 'tx-0' (00000000823c5c63): kobject_uevent_env [ 2626.229859][ T7595] kobject: 'tx-0' (00000000823c5c63): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2626.240799][ T7595] kobject: 'tx-0' (00000000823c5c63): auto cleanup kobject_del [ 2626.248388][ T7595] kobject: 'tx-0' (00000000823c5c63): calling ktype release [ 2626.255674][ T7595] kobject: 'tx-0': free name [ 2626.260250][ T7595] kobject: 'queues' (000000008842dd87): kobject_cleanup, parent (null) [ 2626.269368][ T7595] kobject: 'queues' (000000008842dd87): calling ktype release [ 2626.276832][ T7595] kobject: 'queues' (000000008842dd87): kset_release [ 2626.283532][ T7595] kobject: 'queues': free name [ 2626.288515][ T7595] kobject: 'gre0' (000000003b77073a): kobject_uevent_env [ 2626.295574][ T7595] kobject: 'gre0' (000000003b77073a): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2626.305602][ T7600] kobject: 'gre0' (00000000fe181479): kobject_cleanup, parent (null) [ 2626.313078][ T7591] kobject: 'tunl0' (00000000d0a311fb): kobject_cleanup, parent (null) [ 2626.314941][ T7598] kobject: 'tunl0' (00000000a3e791ed): kobject_cleanup, parent (null) [ 2626.324476][ T7600] kobject: 'gre0' (00000000fe181479): calling ktype release [ 2626.333389][ T7598] kobject: 'tunl0' (00000000a3e791ed): calling ktype release [ 2626.342981][ T7591] kobject: 'tunl0' (00000000d0a311fb): calling ktype release [ 2626.348464][ T7598] kobject: 'tunl0': free name [ 2626.355436][ T7595] kobject: 'gre0' (000000003b77073a): kobject_cleanup, parent (null) [ 2626.360198][ T7600] kobject: 'gre0': free name [ 2626.370901][ T7595] kobject: 'gre0' (000000003b77073a): calling ktype release [ 2626.373588][ T7591] kobject: 'tunl0': free name [ 2626.380837][ T7595] kobject: 'gre0': free name [ 2626.390866][ T7598] kobject: 'rx-0' (00000000874dbad2): kobject_cleanup, parent 00000000ddd0533e [ 2626.399826][ T7598] kobject: 'rx-0' (00000000874dbad2): auto cleanup 'remove' event [ 2626.407680][ T7598] kobject: 'rx-0' (00000000874dbad2): kobject_uevent_env [ 2626.415924][ T7598] kobject: 'rx-0' (00000000874dbad2): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2626.428290][ T7598] kobject: 'rx-0' (00000000874dbad2): auto cleanup kobject_del [ 2626.435936][ T7598] kobject: 'rx-0' (00000000874dbad2): calling ktype release [ 2626.443230][ T7598] kobject: 'rx-0': free name [ 2626.447835][ T7598] kobject: 'tx-0' (0000000095c42599): kobject_cleanup, parent 00000000ddd0533e [ 2626.456795][ T7598] kobject: 'tx-0' (0000000095c42599): auto cleanup 'remove' event [ 2626.464646][ T7598] kobject: 'tx-0' (0000000095c42599): kobject_uevent_env [ 2626.471704][ T7598] kobject: 'tx-0' (0000000095c42599): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2626.482721][ T7598] kobject: 'tx-0' (0000000095c42599): auto cleanup kobject_del [ 2626.490340][ T7598] kobject: 'tx-0' (0000000095c42599): calling ktype release [ 2626.497649][ T7598] kobject: 'tx-0': free name [ 2626.502254][ T7598] kobject: 'queues' (00000000ddd0533e): kobject_cleanup, parent (null) [ 2626.511382][ T7598] kobject: 'queues' (00000000ddd0533e): calling ktype release [ 2626.518863][ T7598] kobject: 'queues' (00000000ddd0533e): kset_release [ 2626.525550][ T7598] kobject: 'queues': free name [ 2626.530515][ T7598] kobject: 'lo' (0000000088ce3d90): kobject_uevent_env [ 2626.537438][ T7598] kobject: 'lo' (0000000088ce3d90): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2626.547698][ T7600] kobject: 'rx-0' (00000000cbce226d): kobject_cleanup, parent 000000009c72fc9f [ 2626.556740][ T7600] kobject: 'rx-0' (00000000cbce226d): auto cleanup 'remove' event [ 2626.564577][ T7600] kobject: 'rx-0' (00000000cbce226d): kobject_uevent_env [ 2626.571596][ T7600] kobject: 'rx-0' (00000000cbce226d): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2626.582613][ T7600] kobject: 'rx-0' (00000000cbce226d): auto cleanup kobject_del [ 2626.590194][ T7600] kobject: 'rx-0' (00000000cbce226d): calling ktype release [ 2626.597479][ T7600] kobject: 'rx-0': free name [ 2626.602079][ T7600] kobject: 'tx-0' (000000007cb3bc73): kobject_cleanup, parent 000000009c72fc9f [ 2626.611357][ T7600] kobject: 'tx-0' (000000007cb3bc73): auto cleanup 'remove' event [ 2626.619180][ T7600] kobject: 'tx-0' (000000007cb3bc73): kobject_uevent_env [ 2626.626333][ T7600] kobject: 'tx-0' (000000007cb3bc73): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2626.637343][ T7600] kobject: 'tx-0' (000000007cb3bc73): auto cleanup kobject_del [ 2626.644921][ T7600] kobject: 'tx-0' (000000007cb3bc73): calling ktype release [ 2626.652174][ T7600] kobject: 'tx-0': free name [ 2626.656801][ T7600] kobject: 'queues' (000000009c72fc9f): kobject_cleanup, parent (null) [ 2626.665931][ T7600] kobject: 'queues' (000000009c72fc9f): calling ktype release [ 2626.673404][ T7600] kobject: 'queues' (000000009c72fc9f): kset_release [ 2626.680063][ T7600] kobject: 'queues': free name [ 2626.685139][ T7600] kobject: 'tunl0' (00000000bc35c63f): kobject_uevent_env [ 2626.692341][ T7600] kobject: 'tunl0' (00000000bc35c63f): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2626.703550][ T7591] kobject: 'rx-0' (0000000017bcaa57): kobject_cleanup, parent 00000000a24cef30 [ 2626.712518][ T7591] kobject: 'rx-0' (0000000017bcaa57): auto cleanup 'remove' event [ 2626.720410][ T7591] kobject: 'rx-0' (0000000017bcaa57): kobject_uevent_env [ 2626.727510][ T7591] kobject: 'rx-0' (0000000017bcaa57): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2626.738353][ T7591] kobject: 'rx-0' (0000000017bcaa57): auto cleanup kobject_del [ 2626.745945][ T7591] kobject: 'rx-0' (0000000017bcaa57): calling ktype release [ 2626.753332][ T7591] kobject: 'rx-0': free name [ 2626.757944][ T7591] kobject: 'tx-0' (0000000069aaef31): kobject_cleanup, parent 00000000a24cef30 [ 2626.766891][ T7591] kobject: 'tx-0' (0000000069aaef31): auto cleanup 'remove' event [ 2626.774719][ T7591] kobject: 'tx-0' (0000000069aaef31): kobject_uevent_env [ 2626.781838][ T7591] kobject: 'tx-0' (0000000069aaef31): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2626.792585][ T7591] kobject: 'tx-0' (0000000069aaef31): auto cleanup kobject_del [ 2626.800162][ T7591] kobject: 'tx-0' (0000000069aaef31): calling ktype release [ 2626.807458][ T7591] kobject: 'tx-0': free name [ 2626.812045][ T7591] kobject: 'queues' (00000000a24cef30): kobject_cleanup, parent (null) [ 2626.821163][ T7591] kobject: 'queues' (00000000a24cef30): calling ktype release [ 2626.828714][ T7591] kobject: 'queues' (00000000a24cef30): kset_release [ 2626.835395][ T7591] kobject: 'queues': free name [ 2626.840368][ T7591] kobject: 'lo' (000000007de04519): kobject_uevent_env [ 2626.847290][ T7591] kobject: 'lo' (000000007de04519): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2626.857363][ T7595] kobject: 'rx-0' (000000001471e269): kobject_cleanup, parent 000000006905cef9 [ 2626.867029][ T7595] kobject: 'rx-0' (000000001471e269): auto cleanup 'remove' event [ 2626.874858][ T7595] kobject: 'rx-0' (000000001471e269): kobject_uevent_env [ 2626.881891][ T7595] kobject: 'rx-0' (000000001471e269): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2626.892940][ T7595] kobject: 'rx-0' (000000001471e269): auto cleanup kobject_del [ 2626.900504][ T7595] kobject: 'rx-0' (000000001471e269): calling ktype release [ 2626.907890][ T7595] kobject: 'rx-0': free name [ 2626.912503][ T7595] kobject: 'tx-0' (0000000058500b03): kobject_cleanup, parent 000000006905cef9 [ 2626.921581][ T7595] kobject: 'tx-0' (0000000058500b03): auto cleanup 'remove' event [ 2626.929396][ T7595] kobject: 'tx-0' (0000000058500b03): kobject_uevent_env [ 2626.936453][ T7595] kobject: 'tx-0' (0000000058500b03): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2626.947470][ T7595] kobject: 'tx-0' (0000000058500b03): auto cleanup kobject_del [ 2626.955062][ T7595] kobject: 'tx-0' (0000000058500b03): calling ktype release [ 2626.962322][ T7595] kobject: 'tx-0': free name [ 2626.966939][ T7595] kobject: 'queues' (000000006905cef9): kobject_cleanup, parent (null) [ 2626.976047][ T7595] kobject: 'queues' (000000006905cef9): calling ktype release [ 2626.983502][ T7595] kobject: 'queues' (000000006905cef9): kset_release [ 2626.990173][ T7595] kobject: 'queues': free name [ 2626.995444][ T7595] kobject: 'tunl0' (00000000382cdc2d): kobject_uevent_env [ 2627.002558][ T7595] kobject: 'tunl0' (00000000382cdc2d): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2627.012792][ T7598] kobject: 'lo' (0000000088ce3d90): kobject_cleanup, parent (null) [ 2627.012813][ T7600] kobject: 'tunl0' (00000000bc35c63f): kobject_cleanup, parent (null) [ 2627.021620][ T7591] kobject: 'lo' (000000007de04519): kobject_cleanup, parent (null) [ 2627.033016][ T7600] kobject: 'tunl0' (00000000bc35c63f): calling ktype release [ 2627.039527][ T7598] kobject: 'lo' (0000000088ce3d90): calling ktype release [ 2627.049008][ T7600] kobject: 'tunl0': free name [ 2627.053973][ T7595] kobject: 'tunl0' (00000000382cdc2d): kobject_cleanup, parent (null) [ 2627.058990][ T7591] kobject: 'lo' (000000007de04519): calling ktype release [ 2627.067617][ T7598] kobject: 'lo': free name [ 2627.067651][ T7595] kobject: 'tunl0' (00000000382cdc2d): calling ktype release [ 2627.077199][ T7591] kobject: 'lo': free name [ 2627.079207][ T7595] kobject: 'tunl0': free name [ 2627.096404][ T7600] kobject: 'rx-0' (0000000044ef6f77): kobject_cleanup, parent 00000000a7a15b7d [ 2627.105411][ T7600] kobject: 'rx-0' (0000000044ef6f77): auto cleanup 'remove' event [ 2627.113345][ T7600] kobject: 'rx-0' (0000000044ef6f77): kobject_uevent_env [ 2627.120378][ T7600] kobject: 'rx-0' (0000000044ef6f77): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2627.131359][ T7600] kobject: 'rx-0' (0000000044ef6f77): auto cleanup kobject_del [ 2627.138947][ T7600] kobject: 'rx-0' (0000000044ef6f77): calling ktype release [ 2627.146226][ T7600] kobject: 'rx-0': free name [ 2627.150820][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): kobject_cleanup, parent 00000000a7a15b7d [ 2627.159775][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): auto cleanup 'remove' event [ 2627.167597][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): kobject_uevent_env [ 2627.174677][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2627.185402][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): auto cleanup kobject_del [ 2627.192977][ T7600] kobject: 'tx-0' (00000000ef0b0dd9): calling ktype release [ 2627.200238][ T7600] kobject: 'tx-0': free name [ 2627.204852][ T7600] kobject: 'queues' (00000000a7a15b7d): kobject_cleanup, parent (null) [ 2627.213971][ T7600] kobject: 'queues' (00000000a7a15b7d): calling ktype release [ 2627.221410][ T7600] kobject: 'queues' (00000000a7a15b7d): kset_release [ 2627.228101][ T7600] kobject: 'queues': free name [ 2627.233230][ T7600] kobject: 'lo' (00000000b0f8a823): kobject_uevent_env [ 2627.240092][ T7600] kobject: 'lo' (00000000b0f8a823): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2627.334353][ T7595] kobject: 'rx-0' (00000000fb2062ae): kobject_cleanup, parent 000000001ba05def [ 2627.363162][ T7595] kobject: 'rx-0' (00000000fb2062ae): auto cleanup 'remove' event [ 2627.370993][ T7595] kobject: 'rx-0' (00000000fb2062ae): kobject_uevent_env [ 2627.395114][ T7595] kobject: 'rx-0' (00000000fb2062ae): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2627.415244][ T7595] kobject: 'rx-0' (00000000fb2062ae): auto cleanup kobject_del [ 2627.422831][ T7595] kobject: 'rx-0' (00000000fb2062ae): calling ktype release [ 2627.432950][ T7595] kobject: 'rx-0': free name [ 2627.437836][ T7595] kobject: 'tx-0' (00000000b57ec878): kobject_cleanup, parent 000000001ba05def [ 2627.462923][ T7595] kobject: 'tx-0' (00000000b57ec878): auto cleanup 'remove' event [ 2627.470739][ T7595] kobject: 'tx-0' (00000000b57ec878): kobject_uevent_env [ 2627.492955][ T7595] kobject: 'tx-0' (00000000b57ec878): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2627.513278][ T7595] kobject: 'tx-0' (00000000b57ec878): auto cleanup kobject_del [ 2627.520859][ T7595] kobject: 'tx-0' (00000000b57ec878): calling ktype release [ 2627.535022][ T7595] kobject: 'tx-0': free name [ 2627.539651][ T7595] kobject: 'queues' (000000001ba05def): kobject_cleanup, parent (null) [ 2627.562915][ T7595] kobject: 'queues' (000000001ba05def): calling ktype release [ 2627.570381][ T7595] kobject: 'queues' (000000001ba05def): kset_release [ 2627.579475][ T7595] kobject: 'queues': free name [ 2627.585313][ T7595] kobject: 'lo' (000000009044e54c): kobject_uevent_env [ 2627.592197][ T7595] kobject: 'lo' (000000009044e54c): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2627.604359][ T7600] kobject: 'lo' (00000000b0f8a823): kobject_cleanup, parent (null) [ 2627.614101][ T7600] kobject: 'lo' (00000000b0f8a823): calling ktype release [ 2627.621217][ T7600] kobject: 'lo': free name [ 2627.665902][ T7595] kobject: 'lo' (000000009044e54c): kobject_cleanup, parent (null) [ 2627.674742][ T7595] kobject: 'lo' (000000009044e54c): calling ktype release [ 2627.681857][ T7595] kobject: 'lo': free name [ 2627.906692][ T3875] kobject: 'loop4' (00000000c407e1b2): kobject_uevent_env [ 2627.924804][ T3875] kobject: 'loop4' (00000000c407e1b2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2628.009043][ T3875] kobject: 'loop5' (00000000d086f347): kobject_uevent_env [ 2628.018001][ T3875] kobject: 'loop5' (00000000d086f347): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:10:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:57 executing program 3: r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x7f7f, 0xfffffffffffffec1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x7, 0x0) timerfd_settime(r1, 0x0, 0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8482200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="30022bbd7000fbdbdf250200000004000500080001004e230000080002000a000000"], 0x1}}, 0x10) close(0xffffffffffffffff) 04:10:57 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000100)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x6, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 04:10:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x0, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2628.262044][ T3875] kobject: 'loop2' (000000002bed9245): kobject_uevent_env [ 2628.291382][ T3875] kobject: 'loop2' (000000002bed9245): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2628.297898][ T7755] IPVS: ftp: loaded support on port[0] = 21 [ 2628.322483][ T7756] IPVS: ftp: loaded support on port[0] = 21 [ 2628.343296][ T3875] kobject: 'loop3' (00000000cd906960): kobject_uevent_env [ 2628.343891][ T7755] kobject: 'lo' (00000000d7f6d31d): kobject_add_internal: parent: 'net', set: 'devices' [ 2628.350772][ T7761] IPVS: ftp: loaded support on port[0] = 21 [ 2628.369846][ T3875] kobject: 'loop3' (00000000cd906960): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2628.372460][ T7755] kobject: 'lo' (00000000d7f6d31d): kobject_uevent_env [ 2628.389833][ T7755] kobject: 'lo' (00000000d7f6d31d): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2628.400031][ T7755] kobject: 'queues' (00000000b0b310a6): kobject_add_internal: parent: 'lo', set: '' [ 2628.410301][ T7755] kobject: 'queues' (00000000b0b310a6): kobject_uevent_env [ 2628.418184][ T7755] kobject: 'queues' (00000000b0b310a6): kobject_uevent_env: filter function caused the event to drop! [ 2628.429249][ T7755] kobject: 'rx-0' (000000000628f962): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.439570][ T7755] kobject: 'rx-0' (000000000628f962): kobject_uevent_env [ 2628.446725][ T7755] kobject: 'rx-0' (000000000628f962): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2628.457568][ T7755] kobject: 'tx-0' (00000000eac8e88a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.468294][ T7755] kobject: 'tx-0' (00000000eac8e88a): kobject_uevent_env [ 2628.475458][ T7755] kobject: 'tx-0' (00000000eac8e88a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2628.488036][ T7755] kobject: 'tunl0' (00000000eea6b950): kobject_add_internal: parent: 'net', set: 'devices' [ 2628.500225][ T7755] kobject: 'tunl0' (00000000eea6b950): kobject_uevent_env [ 2628.507518][ T7755] kobject: 'tunl0' (00000000eea6b950): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2628.517675][ T7755] kobject: 'queues' (000000007b1a12d0): kobject_add_internal: parent: 'tunl0', set: '' [ 2628.527978][ T7755] kobject: 'queues' (000000007b1a12d0): kobject_uevent_env [ 2628.535504][ T7755] kobject: 'queues' (000000007b1a12d0): kobject_uevent_env: filter function caused the event to drop! [ 2628.546676][ T7755] kobject: 'rx-0' (00000000605d149b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.556959][ T7755] kobject: 'rx-0' (00000000605d149b): kobject_uevent_env [ 2628.564202][ T7755] kobject: 'rx-0' (00000000605d149b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2628.575392][ T7755] kobject: 'tx-0' (00000000a528b267): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.585755][ T7755] kobject: 'tx-0' (00000000a528b267): kobject_uevent_env [ 2628.592819][ T7755] kobject: 'tx-0' (00000000a528b267): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2628.605433][ T7756] kobject: 'lo' (00000000b1fdc8aa): kobject_add_internal: parent: 'net', set: 'devices' [ 2628.617383][ T7756] kobject: 'lo' (00000000b1fdc8aa): kobject_uevent_env [ 2628.624609][ T7756] kobject: 'lo' (00000000b1fdc8aa): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2628.634563][ T7756] kobject: 'queues' (00000000f4521573): kobject_add_internal: parent: 'lo', set: '' [ 2628.644723][ T7756] kobject: 'queues' (00000000f4521573): kobject_uevent_env [ 2628.651993][ T7756] kobject: 'queues' (00000000f4521573): kobject_uevent_env: filter function caused the event to drop! [ 2628.663054][ T7756] kobject: 'rx-0' (00000000f6e1fd71): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.673343][ T7756] kobject: 'rx-0' (00000000f6e1fd71): kobject_uevent_env [ 2628.680510][ T7756] kobject: 'rx-0' (00000000f6e1fd71): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2628.691420][ T7756] kobject: 'tx-0' (00000000745572a0): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.701989][ T7756] kobject: 'tx-0' (00000000745572a0): kobject_uevent_env [ 2628.709266][ T7756] kobject: 'tx-0' (00000000745572a0): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2628.721677][ T7761] kobject: 'lo' (0000000053ff4959): kobject_add_internal: parent: 'net', set: 'devices' [ 2628.732331][ T7761] kobject: 'lo' (0000000053ff4959): kobject_uevent_env [ 2628.739301][ T7761] kobject: 'lo' (0000000053ff4959): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2628.748938][ T7761] kobject: 'queues' (0000000072f575d3): kobject_add_internal: parent: 'lo', set: '' [ 2628.758940][ T7761] kobject: 'queues' (0000000072f575d3): kobject_uevent_env [ 2628.766164][ T7761] kobject: 'queues' (0000000072f575d3): kobject_uevent_env: filter function caused the event to drop! [ 2628.777193][ T7761] kobject: 'rx-0' (000000001f45070f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.787363][ T7761] kobject: 'rx-0' (000000001f45070f): kobject_uevent_env [ 2628.794532][ T7761] kobject: 'rx-0' (000000001f45070f): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2628.805389][ T7761] kobject: 'tx-0' (000000007937f8c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.815828][ T7761] kobject: 'tx-0' (000000007937f8c6): kobject_uevent_env [ 2628.822995][ T7761] kobject: 'tx-0' (000000007937f8c6): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2628.836629][ T7761] kobject: 'tunl0' (00000000361daecc): kobject_add_internal: parent: 'net', set: 'devices' [ 2628.848003][ T7761] kobject: 'tunl0' (00000000361daecc): kobject_uevent_env [ 2628.855233][ T7761] kobject: 'tunl0' (00000000361daecc): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2628.865461][ T7761] kobject: 'queues' (00000000f03b141f): kobject_add_internal: parent: 'tunl0', set: '' [ 2628.875744][ T7761] kobject: 'queues' (00000000f03b141f): kobject_uevent_env [ 2628.882984][ T7761] kobject: 'queues' (00000000f03b141f): kobject_uevent_env: filter function caused the event to drop! [ 2628.894126][ T7761] kobject: 'rx-0' (00000000fc1306e7): kobject_add_internal: parent: 'queues', set: 'queues' [ 2628.904370][ T7761] kobject: 'rx-0' (00000000fc1306e7): kobject_uevent_env [ 2628.911475][ T7761] kobject: 'rx-0' (00000000fc1306e7): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0'