_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2305.811668][ T4665] IPVS: ftp: loaded support on port[0] = 21 04:05:35 executing program 2: syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) close(r0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) close(r0) [ 2306.025719][ T4668] IPVS: ftp: loaded support on port[0] = 21 04:05:35 executing program 2: 04:05:35 executing program 2: 04:05:36 executing program 2: 04:05:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:36 executing program 2: 04:05:36 executing program 2: [ 2306.678902][ T4682] IPVS: ftp: loaded support on port[0] = 21 04:05:38 executing program 0: 04:05:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) open$dir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r2}], 0x1, &(0x7f0000000500)={0x0, r3+10000000}, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:05:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2308.719526][ T4691] IPVS: ftp: loaded support on port[0] = 21 04:05:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2310.248842][ T4703] IPVS: ftp: loaded support on port[0] = 21 04:05:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:40 executing program 0: 04:05:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x0, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc3", 0x72) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:40 executing program 2: 04:05:40 executing program 0: 04:05:40 executing program 2: [ 2310.538778][ T4709] IPVS: ftp: loaded support on port[0] = 21 [ 2310.590111][ T4708] IPVS: ftp: loaded support on port[0] = 21 04:05:40 executing program 2: 04:05:40 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="120000000000000084000000060000003e690378515f1c166f46"], 0x1a}, 0x0) [ 2310.649610][ T4712] IPVS: ftp: loaded support on port[0] = 21 04:05:40 executing program 2: 04:05:40 executing program 0: 04:05:43 executing program 0: 04:05:43 executing program 2: 04:05:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2314.216251][ T4733] IPVS: ftp: loaded support on port[0] = 21 04:05:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x0, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 0: 04:05:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc3", 0x72) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 2: 04:05:44 executing program 2: r0 = getpid() fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>'}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000600)={'syz'}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0x0, 0x80, 0x0, 0x0, r1}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x1, 0xdc, 0x4}, {0x8, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(0xffffffffffffffff, &(0x7f0000000740), 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r5, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) 04:05:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010707021dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 2314.648568][ T4738] IPVS: ftp: loaded support on port[0] = 21 [ 2314.674906][ T4752] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:05:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2314.747501][ T4742] IPVS: ftp: loaded support on port[0] = 21 [ 2314.764890][ T4746] IPVS: ftp: loaded support on port[0] = 21 04:05:44 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x7ff) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000300)='veth1_to_team\x00') pwritev(r2, &(0x7f0000000100), 0x0, 0x0) statx(r1, &(0x7f0000001200)='./bus\x00', 0x1000, 0x0, &(0x7f0000001240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'security.', 'y\x00'}, 0x0, 0x0) lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getegid() getpid() ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) get_thread_area(&(0x7f0000000280)={0x14, 0x0, 0x0, 0x800000, 0xfffffffffffffffe, 0x7fff, 0x2, 0x4, 0x8001, 0x7fff}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x40000000, 0x10000101) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000000100)) eventfd2(0x0, 0x0) 04:05:44 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x10) [ 2315.001988][ T4844] IPVS: ftp: loaded support on port[0] = 21 04:05:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2315.329600][ T4972] IPVS: ftp: loaded support on port[0] = 21 [ 2315.432348][ T4975] IPVS: ftp: loaded support on port[0] = 21 04:05:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x0, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2318.478622][ T4981] IPVS: ftp: loaded support on port[0] = 21 [ 2318.564059][ T4983] IPVS: ftp: loaded support on port[0] = 21 [ 2318.603266][ T4986] IPVS: ftp: loaded support on port[0] = 21 04:05:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2318.848086][ T4990] IPVS: ftp: loaded support on port[0] = 21 [ 2318.867836][ T4988] IPVS: ftp: loaded support on port[0] = 21 [ 2318.923748][ T4992] IPVS: ftp: loaded support on port[0] = 21 04:05:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2319.562820][ T4995] IPVS: ftp: loaded support on port[0] = 21 [ 2319.652661][ T4998] IPVS: ftp: loaded support on port[0] = 21 [ 2319.728071][ T5001] IPVS: ftp: loaded support on port[0] = 21 04:05:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2320.485895][ T5004] IPVS: ftp: loaded support on port[0] = 21 [ 2320.537710][ T5008] IPVS: ftp: loaded support on port[0] = 21 [ 2320.570298][ T5009] IPVS: ftp: loaded support on port[0] = 21 04:05:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0x0, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2323.710857][ T5013] IPVS: ftp: loaded support on port[0] = 21 [ 2323.908212][ T5016] IPVS: ftp: loaded support on port[0] = 21 04:05:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2324.235628][ T5019] IPVS: ftp: loaded support on port[0] = 21 [ 2324.314619][ T5021] IPVS: ftp: loaded support on port[0] = 21 04:05:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0x0, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2324.678336][ T5024] IPVS: ftp: loaded support on port[0] = 21 04:05:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0x0, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2325.293922][ T5026] IPVS: ftp: loaded support on port[0] = 21 04:05:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2325.790958][ T5030] IPVS: ftp: loaded support on port[0] = 21 04:05:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2326.050957][ T5032] IPVS: ftp: loaded support on port[0] = 21 04:05:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x0, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2326.269829][ T5036] IPVS: ftp: loaded support on port[0] = 21 04:05:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2328.850836][ T5039] IPVS: ftp: loaded support on port[0] = 21 04:05:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:05:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2329.492118][ T5042] IPVS: ftp: loaded support on port[0] = 21 [ 2329.526832][ T5044] IPVS: ftp: loaded support on port[0] = 21 [ 2329.754988][ T5048] IPVS: ftp: loaded support on port[0] = 21 04:06:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x0, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac87", 0x85) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2331.704812][ T5050] IPVS: ftp: loaded support on port[0] = 21 [ 2331.832116][ T5056] IPVS: ftp: loaded support on port[0] = 21 [ 2331.881402][ T5054] IPVS: ftp: loaded support on port[0] = 21 04:06:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2334.941167][ T5059] IPVS: ftp: loaded support on port[0] = 21 [ 2335.066965][ T5062] IPVS: ftp: loaded support on port[0] = 21 04:06:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2335.765030][ T5066] IPVS: ftp: loaded support on port[0] = 21 04:06:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2335.939447][ T5069] IPVS: ftp: loaded support on port[0] = 21 [ 2336.131354][ T5073] IPVS: ftp: loaded support on port[0] = 21 04:06:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2337.326051][ T5075] IPVS: ftp: loaded support on port[0] = 21 04:06:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43"}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x0, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2337.587333][ T5079] IPVS: ftp: loaded support on port[0] = 21 [ 2337.588173][ T5081] IPVS: ftp: loaded support on port[0] = 21 04:06:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2340.420285][ T5084] IPVS: ftp: loaded support on port[0] = 21 04:06:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2341.328447][ T5088] IPVS: ftp: loaded support on port[0] = 21 [ 2341.342235][ T5090] IPVS: ftp: loaded support on port[0] = 21 04:06:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 04:06:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2342.313339][ T5093] IPVS: ftp: loaded support on port[0] = 21 [ 2342.367708][ T5097] IPVS: ftp: loaded support on port[0] = 21 [ 2342.407687][ T5100] IPVS: ftp: loaded support on port[0] = 21 04:06:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43"}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2343.241882][ T5103] IPVS: ftp: loaded support on port[0] = 21 04:06:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x0, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2343.453132][ T5108] IPVS: ftp: loaded support on port[0] = 21 [ 2343.487928][ T5106] IPVS: ftp: loaded support on port[0] = 21 [ 2343.546987][ T5111] IPVS: ftp: loaded support on port[0] = 21 04:06:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2344.406370][ T5113] IPVS: ftp: loaded support on port[0] = 21 04:06:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2345.223571][ T5115] IPVS: ftp: loaded support on port[0] = 21 04:06:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a55", 0x96) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2346.153869][ T5117] IPVS: ftp: loaded support on port[0] = 21 04:06:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2346.730631][ T5120] IPVS: ftp: loaded support on port[0] = 21 [ 2346.849200][ T5123] IPVS: ftp: loaded support on port[0] = 21 04:06:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a55", 0x96) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2347.081213][ T5125] IPVS: ftp: loaded support on port[0] = 21 04:06:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2348.873409][ T5128] IPVS: ftp: loaded support on port[0] = 21 04:06:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43"}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2349.259643][ T5131] IPVS: ftp: loaded support on port[0] = 21 04:06:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2349.817630][ T5135] IPVS: ftp: loaded support on port[0] = 21 04:06:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x0, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2350.334602][ T5138] IPVS: ftp: loaded support on port[0] = 21 04:06:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2350.521232][ T5141] IPVS: ftp: loaded support on port[0] = 21 [ 2350.747828][ T5144] IPVS: ftp: loaded support on port[0] = 21 04:06:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2351.643239][ T5147] IPVS: ftp: loaded support on port[0] = 21 04:06:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 04:06:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2352.550951][ T5150] IPVS: ftp: loaded support on port[0] = 21 [ 2352.615115][ T5153] IPVS: ftp: loaded support on port[0] = 21 04:06:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2352.880024][ T5156] IPVS: ftp: loaded support on port[0] = 21 04:06:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a55", 0x96) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2353.282700][ T5158] IPVS: ftp: loaded support on port[0] = 21 04:06:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x0, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2354.832032][ T5161] IPVS: ftp: loaded support on port[0] = 21 [ 2354.996816][ T5164] IPVS: ftp: loaded support on port[0] = 21 04:06:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x0, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2355.914852][ T5167] IPVS: ftp: loaded support on port[0] = 21 04:06:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x0, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2356.835863][ T5170] IPVS: ftp: loaded support on port[0] = 21 04:06:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x0, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2357.750032][ T5173] IPVS: ftp: loaded support on port[0] = 21 04:06:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0x0, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2358.579566][ T5176] IPVS: ftp: loaded support on port[0] = 21 [ 2358.640934][ T5179] IPVS: ftp: loaded support on port[0] = 21 04:06:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a", 0x97) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2359.095005][ T5182] IPVS: ftp: loaded support on port[0] = 21 04:06:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2359.239027][ T5184] IPVS: ftp: loaded support on port[0] = 21 [ 2359.440912][ T5187] IPVS: ftp: loaded support on port[0] = 21 04:06:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc89", 0x94) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2360.328247][ T5190] IPVS: ftp: loaded support on port[0] = 21 [ 2360.489234][ T5193] IPVS: ftp: loaded support on port[0] = 21 04:06:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2363.728648][ T5196] IPVS: ftp: loaded support on port[0] = 21 04:06:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0x0, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2364.396129][ T5199] IPVS: ftp: loaded support on port[0] = 21 04:06:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2364.660246][ T5203] IPVS: ftp: loaded support on port[0] = 21 [ 2364.719524][ T5205] IPVS: ftp: loaded support on port[0] = 21 04:06:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a", 0x97) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2365.220927][ T5207] IPVS: ftp: loaded support on port[0] = 21 04:06:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2366.205639][ T5210] IPVS: ftp: loaded support on port[0] = 21 04:06:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, 0x0) 04:06:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x40000000200000, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:06:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000009e, 0x0) [ 2367.215634][ T5220] IPVS: ftp: loaded support on port[0] = 21 04:06:37 executing program 2: clone(0x40000000200, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000180)=0x1002, 0xfdda) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0, 0x0, 0x0, 0x266}, 0x40032021) 04:06:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) close(r0) [ 2376.368208][ T5314] IPVS: ftp: loaded support on port[0] = 21 04:06:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:06:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 04:06:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2379.916273][ T5326] IPVS: ftp: loaded support on port[0] = 21 [ 2379.927634][ T5322] IPVS: ftp: loaded support on port[0] = 21 04:06:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x0, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:49 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='auxv\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000006c0)={0x2, &(0x7f0000000680)=[{0x7fff}, {0x9, 0x240000000}]}) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x200, 0x0) r2 = getpgid(0x0) ptrace$peek(0x1, r2, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getpgid(0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0)) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="3e5e064eed678a71759738311a99b148a08a226c93ba927367962432d43847f2d92057506cc97c7db0cbf8aa0684c2d0434e44cfb5ba7d7c7834a446ae2ee49ea08abfc43a3ec3ea881bb9ef505b0559a34ea28b721f0ae7e47b3cdbcd84bee6d9f24ece3a24fa089db2563142dc2706a6b1aa12e69b108bff2a7b5e1099a5946572032edd65a213bb848f549dcd67c9481019437b595805112f4ad00e8a47964e18e667ecc293", 0xa7, 0xfffffffffffffff9) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000700)="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", 0x1000, 0xfffffffffffffffe) 04:06:49 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140), 0x0, 0x0) [ 2380.130269][ T5333] IPVS: ftp: loaded support on port[0] = 21 [ 2380.159864][ T5329] IPVS: ftp: loaded support on port[0] = 21 [ 2380.235496][ T5337] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2380.838511][ T5344] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2380.966776][ T5346] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac21", 0x8f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2381.182209][ T5349] IPVS: ftp: loaded support on port[0] = 21 04:06:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2381.390615][ T5352] IPVS: ftp: loaded support on port[0] = 21 04:06:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:06:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2383.975487][ T5359] IPVS: ftp: loaded support on port[0] = 21 [ 2383.997930][ T5362] IPVS: ftp: loaded support on port[0] = 21 [ 2384.001123][ T5357] IPVS: ftp: loaded support on port[0] = 21 [ 2384.024584][ T5363] IPVS: ftp: loaded support on port[0] = 21 04:06:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x0, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2384.829899][ T5368] IPVS: ftp: loaded support on port[0] = 21 [ 2384.917060][ T5369] IPVS: ftp: loaded support on port[0] = 21 [ 2385.060739][ T5372] IPVS: ftp: loaded support on port[0] = 21 04:06:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2386.034594][ T5375] IPVS: ftp: loaded support on port[0] = 21 04:06:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2388.831271][ T5377] IPVS: ftp: loaded support on port[0] = 21 04:06:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) [ 2389.350333][ T5380] IPVS: ftp: loaded support on port[0] = 21 04:06:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:06:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2389.709364][ T5382] IPVS: ftp: loaded support on port[0] = 21 [ 2389.975965][ T5385] IPVS: ftp: loaded support on port[0] = 21 04:06:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:06:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:07:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:07:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x0, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2390.792806][ T5399] IPVS: ftp: loaded support on port[0] = 21 04:07:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2391.155106][ T5402] IPVS: ftp: loaded support on port[0] = 21 [ 2391.222374][ T5404] IPVS: ftp: loaded support on port[0] = 21 04:07:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x0, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2391.681922][ T5407] IPVS: ftp: loaded support on port[0] = 21 04:07:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2392.033868][ T5410] IPVS: ftp: loaded support on port[0] = 21 [ 2392.079538][ T5413] IPVS: ftp: loaded support on port[0] = 21 04:07:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2392.979782][ T5416] IPVS: ftp: loaded support on port[0] = 21 04:07:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2394.881431][ T5420] IPVS: ftp: loaded support on port[0] = 21 04:07:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2395.143766][ T5424] IPVS: ftp: loaded support on port[0] = 21 [ 2395.152068][ T5425] IPVS: ftp: loaded support on port[0] = 21 [ 2395.175270][ T5427] IPVS: ftp: loaded support on port[0] = 21 04:07:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2396.537738][ T5432] IPVS: ftp: loaded support on port[0] = 21 [ 2396.547699][ T5434] IPVS: ftp: loaded support on port[0] = 21 04:07:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2400.802121][ T5437] IPVS: ftp: loaded support on port[0] = 21 04:07:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2400.864907][ T5440] IPVS: ftp: loaded support on port[0] = 21 04:07:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2401.061384][ T5443] IPVS: ftp: loaded support on port[0] = 21 [ 2401.081837][ T5445] IPVS: ftp: loaded support on port[0] = 21 04:07:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2401.694342][ T5448] IPVS: ftp: loaded support on port[0] = 21 04:07:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2401.959278][ T5451] IPVS: ftp: loaded support on port[0] = 21 04:07:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2402.194220][ T5454] IPVS: ftp: loaded support on port[0] = 21 [ 2402.296018][ T5457] IPVS: ftp: loaded support on port[0] = 21 [ 2402.355761][ T5460] IPVS: ftp: loaded support on port[0] = 21 04:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2403.231449][ T5463] IPVS: ftp: loaded support on port[0] = 21 04:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2404.143932][ T5466] IPVS: ftp: loaded support on port[0] = 21 04:07:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2405.099860][ T5469] IPVS: ftp: loaded support on port[0] = 21 04:07:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2405.447601][ T5472] IPVS: ftp: loaded support on port[0] = 21 04:07:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2406.060971][ T5475] IPVS: ftp: loaded support on port[0] = 21 04:07:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2406.399398][ T5478] IPVS: ftp: loaded support on port[0] = 21 04:07:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2407.297579][ T5481] IPVS: ftp: loaded support on port[0] = 21 [ 2407.366468][ T5484] IPVS: ftp: loaded support on port[0] = 21 04:07:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x0, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2408.290483][ T5487] IPVS: ftp: loaded support on port[0] = 21 [ 2408.316377][ T5490] IPVS: ftp: loaded support on port[0] = 21 04:07:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2408.488619][ T5493] IPVS: ftp: loaded support on port[0] = 21 [ 2408.518717][ T5495] IPVS: ftp: loaded support on port[0] = 21 04:07:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2408.936323][ T5498] IPVS: ftp: loaded support on port[0] = 21 [ 2409.015327][ T5501] IPVS: ftp: loaded support on port[0] = 21 04:07:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2411.938825][ T5511] IPVS: ftp: loaded support on port[0] = 21 04:07:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2412.745701][ T5513] IPVS: ftp: loaded support on port[0] = 21 04:07:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2412.990152][ T5516] IPVS: ftp: loaded support on port[0] = 21 04:07:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2413.712118][ T5518] IPVS: ftp: loaded support on port[0] = 21 [ 2413.908315][ T5521] IPVS: ftp: loaded support on port[0] = 21 04:07:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2414.813907][ T5524] IPVS: ftp: loaded support on port[0] = 21 04:07:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2415.046329][ T5527] IPVS: ftp: loaded support on port[0] = 21 [ 2415.064577][ T5538] IPVS: ftp: loaded support on port[0] = 21 [ 2415.202878][ T5541] IPVS: ftp: loaded support on port[0] = 21 04:07:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2415.494263][ T5544] IPVS: ftp: loaded support on port[0] = 21 04:07:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2416.335607][ T5547] IPVS: ftp: loaded support on port[0] = 21 04:07:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2418.791374][ T5549] IPVS: ftp: loaded support on port[0] = 21 04:07:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2419.609645][ T5551] IPVS: ftp: loaded support on port[0] = 21 04:07:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2420.489417][ T5553] IPVS: ftp: loaded support on port[0] = 21 04:07:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2420.600156][ T5559] IPVS: ftp: loaded support on port[0] = 21 [ 2420.666383][ T5563] IPVS: ftp: loaded support on port[0] = 21 [ 2420.689476][ T5565] IPVS: ftp: loaded support on port[0] = 21 [ 2420.841415][ T5568] IPVS: ftp: loaded support on port[0] = 21 04:07:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2421.639446][ T5571] IPVS: ftp: loaded support on port[0] = 21 04:07:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2422.277816][ T5574] IPVS: ftp: loaded support on port[0] = 21 04:07:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2422.539323][ T5577] IPVS: ftp: loaded support on port[0] = 21 04:07:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2423.464720][ T5580] IPVS: ftp: loaded support on port[0] = 21 04:07:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2424.346781][ T5583] IPVS: ftp: loaded support on port[0] = 21 04:07:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2425.289708][ T5586] IPVS: ftp: loaded support on port[0] = 21 04:07:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2426.298428][ T5589] IPVS: ftp: loaded support on port[0] = 21 04:07:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2426.638807][ T5592] IPVS: ftp: loaded support on port[0] = 21 04:07:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2426.712602][ T5594] IPVS: ftp: loaded support on port[0] = 21 [ 2426.881870][ T5597] IPVS: ftp: loaded support on port[0] = 21 04:07:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x0, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2427.175625][ T5600] IPVS: ftp: loaded support on port[0] = 21 04:07:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2427.540608][ T5603] IPVS: ftp: loaded support on port[0] = 21 04:07:37 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x1f000000, 0x0, 0x0, 0x0, 0x0) 04:07:38 executing program 3: 04:07:38 executing program 3: 04:07:38 executing program 3: 04:07:38 executing program 3: 04:07:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:38 executing program 3: [ 2429.200867][ T5620] IPVS: ftp: loaded support on port[0] = 21 04:07:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 3: 04:07:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2431.990682][ T5625] IPVS: ftp: loaded support on port[0] = 21 04:07:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) open$dir(0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r2}], 0x1, &(0x7f0000000500)={0x0, r3+10000000}, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x2, 0x200, 0x0, 0x0, 0x5, 0x0, 0x4, 0x1, 0x9, 0x6, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x7, 0xd8, 0x8, 0xc4, 0x3, 0x8, 0x7f, 0x6, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x273, 0x0, 0x100000000, 0x2, @perf_bp={0x0, 0x6}, 0x10, 0x0, 0x2, 0x5, 0x8}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) [ 2432.257184][ T5636] IPVS: ftp: loaded support on port[0] = 21 [ 2432.267518][ T5633] IPVS: ftp: loaded support on port[0] = 21 [ 2432.282026][ T5630] IPVS: ftp: loaded support on port[0] = 21 [ 2432.293356][ T5632] IPVS: ftp: loaded support on port[0] = 21 04:07:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2432.574970][ T5644] IPVS: ftp: loaded support on port[0] = 21 04:07:42 executing program 3: r0 = getpid() r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r4}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) r7 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r2}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x0, 0xdc, 0x4}, {0x0, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(r1, &(0x7f0000000740), 0x8) r8 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r9, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r9, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) 04:07:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:43 executing program 3: r0 = getpid() r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r4}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) r7 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r2}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x0, 0xdc, 0x4}, {0x0, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(r1, &(0x7f0000000740), 0x8) r8 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r9, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r9, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) [ 2433.370213][ T5653] IPVS: ftp: loaded support on port[0] = 21 04:07:43 executing program 3: r0 = getpid() r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/219, 0xdb}, {&(0x7f0000000900)=""/132, 0x84}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @timestamp, @sack_perm, @sack_perm], 0x6) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='fuseblk\x00', 0x2, &(0x7f0000000b00)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, 'y\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r4}}]}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0xffffffffffffffff) r7 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@broadcast, @in=@local, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r2}, {0x200, 0x6, 0x10000000, 0x7a3, 0x1eed, 0x0, 0xdc, 0x4}, {0x0, 0x6, 0x1000, 0xd}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x3501, 0x2, 0x2, 0x401, 0x3, 0x9, 0x3}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x2) read$eventfd(r1, &(0x7f0000000740), 0x8) r8 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r9, 0x400445a0, &(0x7f0000000640)=0x3) epoll_wait(r9, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000000000100, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) 04:07:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2434.281103][ T5661] IPVS: ftp: loaded support on port[0] = 21 04:07:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000280007031dfffd946f610500070000001f00000000000100421ba3a20400ff7e280000001100ffffba16a0aa1c090000000000001200c00e000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) [ 2436.640536][ T5666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2436.724830][ T5669] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 04:07:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x8) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2437.110113][ T5673] IPVS: ftp: loaded support on port[0] = 21 04:07:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:46 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000001200)) 04:07:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2437.314182][ T5676] IPVS: ftp: loaded support on port[0] = 21 [ 2437.349765][ T5684] IPVS: ftp: loaded support on port[0] = 21 [ 2437.358074][ T5681] IPVS: ftp: loaded support on port[0] = 21 [ 2437.374736][ T5686] IPVS: ftp: loaded support on port[0] = 21 [ 2437.587989][ T5689] IPVS: ftp: loaded support on port[0] = 21 04:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2438.131821][ T5692] IPVS: ftp: loaded support on port[0] = 21 04:07:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2438.288392][ T5695] IPVS: ftp: loaded support on port[0] = 21 04:07:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2438.729359][ T5698] IPVS: ftp: loaded support on port[0] = 21 [ 2438.772734][ T5701] IPVS: ftp: loaded support on port[0] = 21 04:07:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2441.894625][ T5704] IPVS: ftp: loaded support on port[0] = 21 04:07:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2442.800866][ T5707] IPVS: ftp: loaded support on port[0] = 21 [ 2442.895126][ T5709] IPVS: ftp: loaded support on port[0] = 21 [ 2442.961008][ T5712] IPVS: ftp: loaded support on port[0] = 21 04:07:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2443.768994][ T5715] IPVS: ftp: loaded support on port[0] = 21 04:07:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2444.564679][ T5718] IPVS: ftp: loaded support on port[0] = 21 04:07:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2444.775645][ T5724] IPVS: ftp: loaded support on port[0] = 21 [ 2444.787675][ T5722] IPVS: ftp: loaded support on port[0] = 21 04:07:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2448.150912][ T5766] IPVS: ftp: loaded support on port[0] = 21 [ 2448.254473][ T5769] IPVS: ftp: loaded support on port[0] = 21 04:07:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2449.020057][ T5772] IPVS: ftp: loaded support on port[0] = 21 04:07:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:07:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2449.937838][ T5775] IPVS: ftp: loaded support on port[0] = 21 04:07:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2450.191235][ T5778] IPVS: ftp: loaded support on port[0] = 21 04:07:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2450.342304][ T5781] IPVS: ftp: loaded support on port[0] = 21 [ 2450.427420][ T5784] IPVS: ftp: loaded support on port[0] = 21 04:08:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2451.149390][ T5787] IPVS: ftp: loaded support on port[0] = 21 04:08:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2452.077193][ T5790] IPVS: ftp: loaded support on port[0] = 21 04:08:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2452.868071][ T5793] IPVS: ftp: loaded support on port[0] = 21 04:08:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2453.823441][ T5796] IPVS: ftp: loaded support on port[0] = 21 04:08:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2454.200097][ T5798] IPVS: ftp: loaded support on port[0] = 21 04:08:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2454.662016][ T5801] IPVS: ftp: loaded support on port[0] = 21 04:08:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2455.877328][ T5804] IPVS: ftp: loaded support on port[0] = 21 04:08:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2456.152361][ T5807] IPVS: ftp: loaded support on port[0] = 21 [ 2456.221937][ T5810] IPVS: ftp: loaded support on port[0] = 21 04:08:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2459.746802][ T5828] IPVS: ftp: loaded support on port[0] = 21 [ 2459.821102][ T5830] IPVS: ftp: loaded support on port[0] = 21 04:08:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2460.540320][ T5833] IPVS: ftp: loaded support on port[0] = 21 [ 2460.728088][ T5836] IPVS: ftp: loaded support on port[0] = 21 04:08:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2461.504006][ T5839] IPVS: ftp: loaded support on port[0] = 21 04:08:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2461.788643][ T5844] IPVS: ftp: loaded support on port[0] = 21 [ 2461.837890][ T5845] IPVS: ftp: loaded support on port[0] = 21 04:08:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2465.237984][ T5848] IPVS: ftp: loaded support on port[0] = 21 04:08:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2466.058557][ T5852] IPVS: ftp: loaded support on port[0] = 21 04:08:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2466.126099][ T5854] IPVS: ftp: loaded support on port[0] = 21 [ 2466.363662][ T5856] IPVS: ftp: loaded support on port[0] = 21 04:08:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2467.449961][ T5860] IPVS: ftp: loaded support on port[0] = 21 [ 2467.463692][ T5862] IPVS: ftp: loaded support on port[0] = 21 [ 2467.653909][ T5865] IPVS: ftp: loaded support on port[0] = 21 04:08:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2471.492499][ T5871] IPVS: ftp: loaded support on port[0] = 21 [ 2471.517959][ T5872] IPVS: ftp: loaded support on port[0] = 21 04:08:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2472.004996][ T5874] IPVS: ftp: loaded support on port[0] = 21 04:08:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2472.864333][ T5876] IPVS: ftp: loaded support on port[0] = 21 04:08:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2473.071493][ T5881] IPVS: ftp: loaded support on port[0] = 21 [ 2473.079515][ T5882] IPVS: ftp: loaded support on port[0] = 21 [ 2473.142469][ T5885] IPVS: ftp: loaded support on port[0] = 21 04:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2476.388059][ T5888] IPVS: ftp: loaded support on port[0] = 21 04:08:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2476.740524][ T5891] IPVS: ftp: loaded support on port[0] = 21 04:08:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2477.628513][ T5894] IPVS: ftp: loaded support on port[0] = 21 04:08:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2478.581543][ T5901] IPVS: ftp: loaded support on port[0] = 21 04:08:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2478.680005][ T5905] IPVS: ftp: loaded support on port[0] = 21 [ 2478.698692][ T5907] IPVS: ftp: loaded support on port[0] = 21 [ 2478.897957][ T5909] IPVS: ftp: loaded support on port[0] = 21 04:08:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2479.720747][ T5912] IPVS: ftp: loaded support on port[0] = 21 [ 2479.732151][ T5914] IPVS: ftp: loaded support on port[0] = 21 04:08:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2480.769087][ T5917] IPVS: ftp: loaded support on port[0] = 21 04:08:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2481.294389][ T5920] IPVS: ftp: loaded support on port[0] = 21 04:08:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2481.741414][ T5923] IPVS: ftp: loaded support on port[0] = 21 04:08:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2482.747367][ T5926] IPVS: ftp: loaded support on port[0] = 21 04:08:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r0, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2483.757073][ T5929] IPVS: ftp: loaded support on port[0] = 21 [ 2483.805650][ T5933] IPVS: ftp: loaded support on port[0] = 21 04:08:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2484.374826][ T5936] IPVS: ftp: loaded support on port[0] = 21 04:08:34 executing program 3: socketpair(0x25, 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 04:08:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="1fca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2485.136633][ T5946] IPVS: ftp: loaded support on port[0] = 21 04:08:35 executing program 3: mmap(&(0x7f0000198000/0x2000)=nil, 0x2000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) mmap(&(0x7f0000197000/0x10000)=nil, 0x10000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) 04:08:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000080)=""/86, 0x56}, {&(0x7f0000000200)=""/221, 0xdd}, {&(0x7f0000000300)=""/222, 0xde}], 0x3, 0x0) [ 2485.951623][ T5957] IPVS: ftp: loaded support on port[0] = 21 04:08:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:36 executing program 3: ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:08:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2487.024660][ T5963] IPVS: ftp: loaded support on port[0] = 21 [ 2487.090239][ T5968] IPVS: ftp: loaded support on port[0] = 21 04:08:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000080)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x58d9b16a, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1, 0x0, [], 0xffffffff}]}}) 04:08:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:38 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 04:08:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:38 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000040)=0x1, 0x0, 0x1, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052fc73ca67775c541d449502b248099535c6b0b9d43f540ef8c37b41eb2a5b0cd3a4b5feecae8f509732442430e93179bf486d28bbcdb4835"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2488.903376][ T5980] kvm: apic: phys broadcast and lowest prio 04:08:38 executing program 3: r0 = socket$inet(0x2, 0x100000000003, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000100)={{0x11, @dev, 0x0, 0x1, 'wlc\x00'}, {@multicast2}}, 0x44) 04:08:38 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000004c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0xffffffffffffffff, @random="277a4c148d89", 'bridge_slave_0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) [ 2489.007168][ T5976] IPVS: ftp: loaded support on port[0] = 21 [ 2489.026651][ T5978] IPVS: ftp: loaded support on port[0] = 21 04:08:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) 04:08:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@local, 0x0, 0xffffffffffffffff}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x30) fcntl$setstatus(r1, 0x4, 0x42803) [ 2489.455317][ T6004] ptrace attach of "/root/syz-executor.2"[6003] was attempted by "/root/syz-executor.2"[6004] 04:08:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) [ 2491.943201][ T6013] IPVS: ftp: loaded support on port[0] = 21 [ 2491.950630][ T6009] IPVS: ftp: loaded support on port[0] = 21 [ 2491.958636][ T6012] IPVS: ftp: loaded support on port[0] = 21 [ 2491.969433][ T6015] IPVS: ftp: loaded support on port[0] = 21 04:08:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2493.158351][ T6018] IPVS: ftp: loaded support on port[0] = 21 [ 2493.246761][ T6021] IPVS: ftp: loaded support on port[0] = 21 04:08:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2494.237483][ T6024] IPVS: ftp: loaded support on port[0] = 21 04:08:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2495.126337][ T6027] IPVS: ftp: loaded support on port[0] = 21 04:08:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2495.904525][ T6030] IPVS: ftp: loaded support on port[0] = 21 04:08:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2496.761701][ T6033] IPVS: ftp: loaded support on port[0] = 21 04:08:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2497.307734][ T6036] IPVS: ftp: loaded support on port[0] = 21 04:08:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2497.661028][ T6039] IPVS: ftp: loaded support on port[0] = 21 04:08:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x0, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) [ 2498.004422][ T6042] IPVS: ftp: loaded support on port[0] = 21 [ 2498.029372][ T6044] IPVS: ftp: loaded support on port[0] = 21 [ 2498.039932][ T6047] IPVS: ftp: loaded support on port[0] = 21 04:08:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2498.912233][ T6050] IPVS: ftp: loaded support on port[0] = 21 [ 2499.048981][ T6053] IPVS: ftp: loaded support on port[0] = 21 04:08:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2499.890500][ T6056] IPVS: ftp: loaded support on port[0] = 21 04:08:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2500.713649][ T6059] IPVS: ftp: loaded support on port[0] = 21 04:08:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2502.340402][ T6062] IPVS: ftp: loaded support on port[0] = 21 04:08:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2502.802402][ T6065] IPVS: ftp: loaded support on port[0] = 21 04:08:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2503.336789][ T6068] IPVS: ftp: loaded support on port[0] = 21 04:08:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2503.678350][ T6071] IPVS: ftp: loaded support on port[0] = 21 04:08:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:08:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x0, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2504.119827][ T6073] IPVS: ftp: loaded support on port[0] = 21 [ 2504.288117][ T6077] IPVS: ftp: loaded support on port[0] = 21 [ 2504.308640][ T6079] IPVS: ftp: loaded support on port[0] = 21 04:08:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2505.502585][ T6082] IPVS: ftp: loaded support on port[0] = 21 04:08:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2506.381943][ T6086] IPVS: ftp: loaded support on port[0] = 21 [ 2506.392467][ T6088] IPVS: ftp: loaded support on port[0] = 21 04:08:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2507.345553][ T6091] IPVS: ftp: loaded support on port[0] = 21 04:08:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x0, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:59 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) [ 2509.600385][ T6094] IPVS: ftp: loaded support on port[0] = 21 [ 2509.657500][ T6097] IPVS: ftp: loaded support on port[0] = 21 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:08:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:08:59 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2510.101821][ T6109] IPVS: ftp: loaded support on port[0] = 21 [ 2510.128908][ T6104] IPVS: ftp: loaded support on port[0] = 21 04:08:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x0) 04:09:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x0, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2510.514513][ T6114] IPVS: ftp: loaded support on port[0] = 21 [ 2510.534239][ T6116] IPVS: ftp: loaded support on port[0] = 21 04:09:01 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2511.765215][ T6119] IPVS: ftp: loaded support on port[0] = 21 04:09:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x0, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) unshare(0x40000000) 04:09:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2512.350467][ T6129] IPVS: ftp: loaded support on port[0] = 21 [ 2512.443614][ T6127] IPVS: ftp: loaded support on port[0] = 21 [ 2512.450064][ T6128] IPVS: ftp: loaded support on port[0] = 21 [ 2512.474757][ T6130] IPVS: ftp: loaded support on port[0] = 21 04:09:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2512.760841][ T6133] IPVS: ftp: loaded support on port[0] = 21 04:09:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2514.403071][ T6136] IPVS: ftp: loaded support on port[0] = 21 [ 2514.551618][ T6139] IPVS: ftp: loaded support on port[0] = 21 04:09:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2514.743657][ T6142] IPVS: ftp: loaded support on port[0] = 21 04:09:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2515.308437][ T6146] IPVS: ftp: loaded support on port[0] = 21 04:09:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2515.657390][ T6148] IPVS: ftp: loaded support on port[0] = 21 [ 2515.672736][ T6154] IPVS: ftp: loaded support on port[0] = 21 [ 2515.765788][ T6152] IPVS: ftp: loaded support on port[0] = 21 04:09:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0x0, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 1: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2517.751849][ T6160] IPVS: ftp: loaded support on port[0] = 21 [ 2517.762598][ T6158] IPVS: ftp: loaded support on port[0] = 21 [ 2517.892835][ T6171] IPVS: ftp: loaded support on port[0] = 21 [ 2517.925916][ T6172] IPVS: ftp: loaded support on port[0] = 21 04:09:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2518.210702][ T6175] IPVS: ftp: loaded support on port[0] = 21 [ 2518.336223][ T6177] IPVS: ftp: loaded support on port[0] = 21 04:09:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2518.917007][ T6184] IPVS: ftp: loaded support on port[0] = 21 [ 2518.987639][ T6180] IPVS: ftp: loaded support on port[0] = 21 04:09:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2519.337090][ T6187] IPVS: ftp: loaded support on port[0] = 21 04:09:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2520.953793][ T6191] IPVS: ftp: loaded support on port[0] = 21 04:09:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2521.307980][ T6194] IPVS: ftp: loaded support on port[0] = 21 [ 2521.405404][ T6196] IPVS: ftp: loaded support on port[0] = 21 04:09:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x0, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2521.969360][ T6200] IPVS: ftp: loaded support on port[0] = 21 04:09:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x0, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2523.076209][ T6203] IPVS: ftp: loaded support on port[0] = 21 [ 2523.214918][ T6208] IPVS: ftp: loaded support on port[0] = 21 [ 2523.229991][ T6206] IPVS: ftp: loaded support on port[0] = 21 04:09:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2523.575451][ T6211] IPVS: ftp: loaded support on port[0] = 21 04:09:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2524.022573][ T6213] IPVS: ftp: loaded support on port[0] = 21 04:09:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2524.298451][ T6216] IPVS: ftp: loaded support on port[0] = 21 [ 2524.307714][ T6219] IPVS: ftp: loaded support on port[0] = 21 04:09:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2525.985720][ T6222] IPVS: ftp: loaded support on port[0] = 21 04:09:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2526.905351][ T6225] IPVS: ftp: loaded support on port[0] = 21 04:09:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2527.779784][ T6228] IPVS: ftp: loaded support on port[0] = 21 04:09:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2528.704875][ T6231] IPVS: ftp: loaded support on port[0] = 21 04:09:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x0, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.022030][ T6234] IPVS: ftp: loaded support on port[0] = 21 04:09:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.553989][ T6237] IPVS: ftp: loaded support on port[0] = 21 04:09:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.812661][ T6240] IPVS: ftp: loaded support on port[0] = 21 04:09:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2529.971070][ T6243] IPVS: ftp: loaded support on port[0] = 21 [ 2530.035677][ T6246] IPVS: ftp: loaded support on port[0] = 21 [ 2530.059793][ T6248] IPVS: ftp: loaded support on port[0] = 21 04:09:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2530.808773][ T6251] IPVS: ftp: loaded support on port[0] = 21 04:09:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x0, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2530.948933][ T6253] IPVS: ftp: loaded support on port[0] = 21 04:09:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2532.016248][ T6255] IPVS: ftp: loaded support on port[0] = 21 04:09:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2532.904395][ T6257] IPVS: ftp: loaded support on port[0] = 21 04:09:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2533.969685][ T6259] IPVS: ftp: loaded support on port[0] = 21 04:09:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2534.953655][ T6261] IPVS: ftp: loaded support on port[0] = 21 04:09:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2535.666418][ T6264] IPVS: ftp: loaded support on port[0] = 21 04:09:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2535.867417][ T6267] IPVS: ftp: loaded support on port[0] = 21 04:09:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2536.404752][ T6270] IPVS: ftp: loaded support on port[0] = 21 [ 2536.549973][ T6276] IPVS: ftp: loaded support on port[0] = 21 [ 2536.557571][ T6275] IPVS: ftp: loaded support on port[0] = 21 04:09:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2536.705851][ T6279] IPVS: ftp: loaded support on port[0] = 21 04:09:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2538.311834][ T6282] IPVS: ftp: loaded support on port[0] = 21 04:09:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2539.360875][ T6284] IPVS: ftp: loaded support on port[0] = 21 04:09:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2540.345134][ T6286] IPVS: ftp: loaded support on port[0] = 21 04:09:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x0, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2541.295836][ T6288] IPVS: ftp: loaded support on port[0] = 21 04:09:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2542.152074][ T6291] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2542.476992][ T6294] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2542.850803][ T6299] IPVS: ftp: loaded support on port[0] = 21 [ 2542.957540][ T6300] IPVS: ftp: loaded support on port[0] = 21 [ 2543.028993][ T6304] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x0, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2543.070987][ T6319] IPVS: ftp: loaded support on port[0] = 21 04:09:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2543.293328][ T6327] IPVS: ftp: loaded support on port[0] = 21 [ 2543.306130][ T6322] IPVS: ftp: loaded support on port[0] = 21 [ 2543.358994][ T6324] IPVS: ftp: loaded support on port[0] = 21 04:09:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x0, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0x0, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2548.055402][ T6330] IPVS: ftp: loaded support on port[0] = 21 [ 2548.248720][ T6334] IPVS: ftp: loaded support on port[0] = 21 [ 2548.268015][ T6336] IPVS: ftp: loaded support on port[0] = 21 04:09:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2548.765999][ T6338] IPVS: ftp: loaded support on port[0] = 21 04:09:38 executing program 3: r0 = memfd_create(&(0x7f0000000180)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:09:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2549.135627][ T6345] IPVS: ftp: loaded support on port[0] = 21 04:09:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2549.547335][ T6349] IPVS: ftp: loaded support on port[0] = 21 04:09:39 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) epoll_create1(0x0) pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) 04:09:39 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000000)=0x7fff, 0x12) 04:09:39 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xc, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) futex(&(0x7f0000000040), 0x8c, 0x1, 0x0, &(0x7f0000001280), 0x0) 04:09:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00h\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2551.320949][ T6367] device team0 entered promiscuous mode [ 2551.326588][ T6367] device team_slave_0 entered promiscuous mode [ 2551.332873][ T6367] device team_slave_1 entered promiscuous mode [ 2551.363245][ T6367] 8021q: adding VLAN 0 to HW filter on device team0 [ 2551.386600][ T6368] device team0 left promiscuous mode [ 2551.394200][ T6368] device team_slave_0 left promiscuous mode [ 2551.408012][ T6368] device team_slave_1 left promiscuous mode [ 2551.593534][ T6369] device team0 entered promiscuous mode [ 2551.614601][ T6369] device team_slave_0 entered promiscuous mode [ 2551.635345][ T6369] device team_slave_1 entered promiscuous mode [ 2551.661697][ T6369] 8021q: adding VLAN 0 to HW filter on device team0 04:09:41 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r4}], 0x1, &(0x7f0000000500)={0x0, r5+10000000}, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) ioctl$RNDADDENTROPY(r4, 0x40085203, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) lseek(r1, 0x0, 0x1000000003) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x2, 0x200, 0x0, 0x0, 0x5, 0x0, 0x4, 0x1, 0x9, 0x6, 0x4, 0x3f, 0x20, 0x100000000, 0x8, 0x7, 0x7, 0xd8, 0x8, 0xc4, 0x3, 0x8, 0x7f, 0x6, 0x40, 0x76, 0x200, 0x0, 0x0, 0x1, 0x1ff, 0x8, 0x5, 0x6, 0x273, 0x0, 0x100000000, 0x2, @perf_bp={&(0x7f00000000c0), 0x6}, 0x10, 0xb94f, 0x2, 0x5, 0x8, 0x14, 0xffffffffffffffe1}, r6, 0x10, 0xffffffffffffff9c, 0x1) 04:09:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x0, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:42 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) [ 2552.846622][ T6381] IPVS: ftp: loaded support on port[0] = 21 04:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2553.190356][ T6392] IPVS: ftp: loaded support on port[0] = 21 04:09:45 executing program 1: 04:09:45 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 04:09:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:45 executing program 1: 04:09:45 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 04:09:45 executing program 1: 04:09:45 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x0, 0x100000001, 0x0, [], &(0x7f0000000000)={0x98f903, 0x0, [], @ptr}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x511000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) [ 2555.571473][ T6400] IPVS: ftp: loaded support on port[0] = 21 [ 2555.646634][ T6405] IPVS: ftp: loaded support on port[0] = 21 [ 2555.684250][ T6409] IPVS: ftp: loaded support on port[0] = 21 04:09:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x0, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:46 executing program 1: 04:09:46 executing program 3: 04:09:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:46 executing program 1: [ 2557.162539][ T6424] IPVS: ftp: loaded support on port[0] = 21 [ 2557.197033][ T6421] IPVS: ftp: loaded support on port[0] = 21 04:09:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:48 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x80000003) r0 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r0, &(0x7f0000000080)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x98) r1 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4004700c, 0x349) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x50070000, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000a40)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000000)={{0x0, 0x8001}, 0x0, 0x9, 0x0, {0x70d, 0x976}, 0x9, 0x20}) [ 2559.128617][ T6431] IPVS: ftp: loaded support on port[0] = 21 [ 2559.211319][ T6430] QAT: Invalid ioctl [ 2559.283587][ T6433] QAT: Invalid ioctl 04:09:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x0, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:49 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000004c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0xffffffffffffffff, @random="277a4c148d89", 'bridge_slave_0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'veth0_to_bond\x00'}}) 04:09:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x0, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:49 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x80000003) r0 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r0, &(0x7f0000000080)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x98) r1 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4004700c, 0x349) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x50070000, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000a40)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000000)={{0x0, 0x8001}, 0x0, 0x9, 0x0, {0x70d, 0x976}, 0x9, 0x20}) [ 2559.565124][ T6438] IPVS: ftp: loaded support on port[0] = 21 04:09:49 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x80000003) r0 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r0, &(0x7f0000000080)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x98) r1 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4004700c, 0x349) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x50070000, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000a40)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000000)={{0x0, 0x8001}, 0x0, 0x9, 0x0, {0x70d, 0x976}, 0x9, 0x20}) [ 2559.611155][ T6467] IPVS: ftp: loaded support on port[0] = 21 04:09:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2559.768757][ T6547] QAT: Invalid ioctl [ 2559.861285][ T6546] QAT: Invalid ioctl 04:09:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) [ 2559.964165][ T6550] IPVS: ftp: loaded support on port[0] = 21 04:09:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0f8e"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:09:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x400000000000098, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 2561.346603][ T6665] IPVS: ftp: loaded support on port[0] = 21 [ 2561.375438][ T6663] IPVS: ftp: loaded support on port[0] = 21 [ 2561.417239][ T6667] IPVS: ftp: loaded support on port[0] = 21 04:09:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x0, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2564.174770][ T6672] IPVS: ftp: loaded support on port[0] = 21 [ 2564.218151][ T6677] IPVS: ftp: loaded support on port[0] = 21 [ 2564.228820][ T6674] IPVS: ftp: loaded support on port[0] = 21 04:09:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2566.268184][ T6681] IPVS: ftp: loaded support on port[0] = 21 [ 2566.276296][ T6683] IPVS: ftp: loaded support on port[0] = 21 [ 2566.288203][ T6685] IPVS: ftp: loaded support on port[0] = 21 04:09:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:09:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2569.377843][ T6688] IPVS: ftp: loaded support on port[0] = 21 04:09:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x0, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2569.516311][ T6691] IPVS: ftp: loaded support on port[0] = 21 [ 2569.633346][ T6694] IPVS: ftp: loaded support on port[0] = 21 04:10:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2570.527087][ T6697] IPVS: ftp: loaded support on port[0] = 21 04:10:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2571.309558][ T6700] IPVS: ftp: loaded support on port[0] = 21 [ 2571.430755][ T6704] IPVS: ftp: loaded support on port[0] = 21 [ 2571.488449][ T6707] IPVS: ftp: loaded support on port[0] = 21 [ 2571.502742][ T6708] IPVS: ftp: loaded support on port[0] = 21 04:10:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x0, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2574.623798][ T6711] IPVS: ftp: loaded support on port[0] = 21 [ 2574.716021][ T6714] IPVS: ftp: loaded support on port[0] = 21 04:10:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2576.733726][ T6719] IPVS: ftp: loaded support on port[0] = 21 [ 2576.748529][ T6718] IPVS: ftp: loaded support on port[0] = 21 [ 2576.789107][ T6722] IPVS: ftp: loaded support on port[0] = 21 [ 2576.958413][ T6725] IPVS: ftp: loaded support on port[0] = 21 04:10:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2580.013573][ T6728] IPVS: ftp: loaded support on port[0] = 21 [ 2580.062319][ T6731] IPVS: ftp: loaded support on port[0] = 21 04:10:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2580.976246][ T6734] IPVS: ftp: loaded support on port[0] = 21 [ 2581.071368][ T6737] IPVS: ftp: loaded support on port[0] = 21 04:10:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2582.115639][ T6739] IPVS: ftp: loaded support on port[0] = 21 04:10:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x0, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2582.297426][ T6742] IPVS: ftp: loaded support on port[0] = 21 [ 2582.410884][ T6768] IPVS: ftp: loaded support on port[0] = 21 [ 2582.457494][ T6771] IPVS: ftp: loaded support on port[0] = 21 04:10:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x0, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2586.279275][ T6774] IPVS: ftp: loaded support on port[0] = 21 04:10:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2586.784073][ T6777] IPVS: ftp: loaded support on port[0] = 21 04:10:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2587.189281][ T6780] IPVS: ftp: loaded support on port[0] = 21 04:10:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2587.869063][ T6785] IPVS: ftp: loaded support on port[0] = 21 [ 2587.945504][ T6783] IPVS: ftp: loaded support on port[0] = 21 [ 2588.057053][ T6788] IPVS: ftp: loaded support on port[0] = 21 04:10:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x0, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, 0x0, 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2588.461264][ T6791] IPVS: ftp: loaded support on port[0] = 21 [ 2588.496477][ T6794] IPVS: ftp: loaded support on port[0] = 21 04:10:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2589.363800][ T6797] IPVS: ftp: loaded support on port[0] = 21 04:10:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2590.315365][ T6800] IPVS: ftp: loaded support on port[0] = 21 04:10:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2592.199148][ T6803] IPVS: ftp: loaded support on port[0] = 21 04:10:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2593.041656][ T6806] IPVS: ftp: loaded support on port[0] = 21 04:10:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x0, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2593.847423][ T6809] IPVS: ftp: loaded support on port[0] = 21 [ 2593.861630][ T6811] IPVS: ftp: loaded support on port[0] = 21 04:10:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2594.015436][ T6814] IPVS: ftp: loaded support on port[0] = 21 [ 2594.225728][ T6817] IPVS: ftp: loaded support on port[0] = 21 04:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x0, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2594.687257][ T6820] IPVS: ftp: loaded support on port[0] = 21 04:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x0, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2595.251576][ T6823] IPVS: ftp: loaded support on port[0] = 21 04:10:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2595.971122][ T6826] IPVS: ftp: loaded support on port[0] = 21 04:10:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x0, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2596.216415][ T6829] IPVS: ftp: loaded support on port[0] = 21 04:10:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x0, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2597.152392][ T6832] IPVS: ftp: loaded support on port[0] = 21 04:10:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x0, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2598.024641][ T6835] IPVS: ftp: loaded support on port[0] = 21 04:10:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x0, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2598.927684][ T6838] IPVS: ftp: loaded support on port[0] = 21 04:10:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x0, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2599.737698][ T6840] IPVS: ftp: loaded support on port[0] = 21 [ 2599.951826][ T6843] IPVS: ftp: loaded support on port[0] = 21 04:10:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2600.220173][ T6849] IPVS: ftp: loaded support on port[0] = 21 [ 2600.237633][ T6852] IPVS: ftp: loaded support on port[0] = 21 [ 2600.242864][ T6851] IPVS: ftp: loaded support on port[0] = 21 04:10:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2600.994749][ T6855] IPVS: ftp: loaded support on port[0] = 21 [ 2601.214125][ T6858] IPVS: ftp: loaded support on port[0] = 21 04:10:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x0, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2605.100274][ T6861] IPVS: ftp: loaded support on port[0] = 21 04:10:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x0, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2605.764677][ T6864] IPVS: ftp: loaded support on port[0] = 21 04:10:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2605.858835][ T6866] IPVS: ftp: loaded support on port[0] = 21 [ 2605.912271][ T6869] IPVS: ftp: loaded support on port[0] = 21 [ 2605.997536][ T6872] IPVS: ftp: loaded support on port[0] = 21 04:10:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2606.810234][ T6875] IPVS: ftp: loaded support on port[0] = 21 [ 2606.940498][ T6878] IPVS: ftp: loaded support on port[0] = 21 04:10:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x0, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 04:10:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x40000000000003, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r3, 0x2, 0x2, &(0x7f0000000100)=[{}, {}], 0x0) syz_genetlink_get_family_id$tipc2(0x0) io_destroy(r3) [ 2611.593249][ T6881] IPVS: ftp: loaded support on port[0] = 21 04:10:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mlockall(0x400000000007) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x4) 04:10:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x0, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) close(r1) 04:10:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 04:10:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x2c, r1, 0x605, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) [ 2611.954565][ T6998] IPVS: ftp: loaded support on port[0] = 21 04:10:41 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x2000000, 0x11, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x30400, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x100000073) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 04:10:41 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) socket$inet_dccp(0x2, 0x6, 0x0) io_submit(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x81}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x103, 0x6, {0xffff, 0x7fff, 0x9, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0x0, 0x300, 0x44f0f00000000000, [], &(0x7f0000000000)={0x0, 0x0, [], @p_u32=0x0}}) 04:10:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x0, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000580)='ramfs\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0x6, 0x2) chdir(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x7) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x7ffffe, 0x4002011, r2, 0x0) [ 2612.571519][ T26] audit: type=1804 audit(1553573442.253:38): pid=7226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/newroot/2039/file0/bus" dev="ramfs" ino=339517 res=1 [ 2612.662696][ T26] audit: type=1804 audit(1553573442.253:39): pid=7226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/newroot/2039/file0/bus" dev="ramfs" ino=339517 res=1 [ 2612.697036][ T7221] IPVS: ftp: loaded support on port[0] = 21 [ 2612.705074][ T7224] IPVS: ftp: loaded support on port[0] = 21 04:10:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) io_submit(0x0, 0x1, &(0x7f00000009c0)=[&(0x7f0000000980)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000900)="8473212d21863729f7bf05672056f871fca3a81cdb12d24b22d615d3a601fd2012987bfdbdbf86ddf5fb44cca91d359fd05cb2fa13989d6fd5d80e71eecd26e62e7986fd62c94d456818384fbf406ab3cca4795265f5fb32999a6a394d8182dd16c2a3b7bbb84fd61796", 0x6a, 0x1, 0x0, 0x1, r0}]) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x840100000000009) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x81}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x103, 0x6, {0xffff, 0x7fff, 0x9, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000140)={0x0, 0x300, 0x44f0f00000000000, [], &(0x7f0000000000)={0x0, 0x0, [], @p_u32=0x0}}) 04:10:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2612.727570][ T7231] IPVS: ftp: loaded support on port[0] = 21 04:10:42 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) [ 2612.802702][ T26] audit: type=1804 audit(1553573442.283:40): pid=7226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/newroot/2039/file0/bus" dev="ramfs" ino=339517 res=1 04:10:42 executing program 3: r0 = socket(0x2, 0x80003, 0xe7) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2613.002958][ T7334] IPVS: ftp: loaded support on port[0] = 21 04:10:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x400000000007) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x4) 04:10:42 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/11, 0xb, 0xfffffffffffffbfd, 0x8, 0x7, 0x3adb, 0xfff}, 0x120) socket$inet6(0xa, 0x1000000000002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(0x0, 0x800000000000000, 0x81) r2 = gettid() getgid() writev(r1, 0x0, 0x140) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x1c9c380}, {r3, r4+30000000}}, &(0x7f0000000100)) tkill(r2, 0x1004000000016) close(r0) 04:10:43 executing program 3: 04:10:43 executing program 3: 04:10:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01", 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x0, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r3, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:46 executing program 3: 04:10:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed13", 0x4c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) getsockname$unix(r1, &(0x7f0000000680), &(0x7f0000000640)=0x3f) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:46 executing program 1: 04:10:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x2917, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x0, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2617.107290][ T7567] IPVS: ftp: loaded support on port[0] = 21 [ 2617.208956][ T7570] IPVS: ftp: loaded support on port[0] = 21 [ 2617.219803][ T7574] IPVS: ftp: loaded support on port[0] = 21 04:10:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a01005b", 0x9a) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x8001, 0xc3c, 0x1, 0x0, 0x8000, 0x10000, 0xa, 0x3, 0x3, 0x4, 0x8, 0x400, 0x8, 0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x7ff, 0x8000, 0x6, 0xfffffffffffffffb, 0x20000813, 0xffffffff, 0x0, 0x9, 0x10001, 0x6, 0x6, 0x10000, 0x0, 0x20, 0x20b3af56, 0x7, 0x0, 0xaaf591, 0x1, @perf_config_ext={0x2babc000000000, 0x200}, 0x1040, 0x7ff, 0x3, 0x8, 0x4, 0xe15d}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32, @ANYRES32], 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) 04:10:47 executing program 3: 04:10:47 executing program 1: 04:10:47 executing program 1: 04:10:47 executing program 3: [ 2617.611373][ T7580] IPVS: ftp: loaded support on port[0] = 21 04:10:47 executing program 3: 04:10:47 executing program 1: