, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:07 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:07 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:08 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:08 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:08 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:09 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:09 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:10 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:10 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:11 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:12 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:12 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:13 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:13 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:13 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:14 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:14 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:15 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:15 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:16 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:17 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:17 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:18 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:18 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:18 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:19 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:19 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:20 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:20 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:21 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:22 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:22 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:23 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:23 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:23 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:24 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:24 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:25 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:25 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:26 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:27 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:27 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:27 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:28 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:28 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:29 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:29 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:30 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:30 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:31 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:32 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:32 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:32 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:33 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:33 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:34 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:34 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:35 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:35 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:36 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:36 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:36 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:37 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:37 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:37 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:38 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:38 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:39 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:39 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:40 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:40 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:41 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:41 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:41 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:42 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:42 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:42 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:43 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:43 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:44 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:44 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:45 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:45 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:46 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:46 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:46 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:47 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:47 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:47 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:48 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:48 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:49 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:49 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:50 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:50 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:51 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:51 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:51 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:52 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:52 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:52 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:53 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:53 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:54 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:54 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:55 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:55 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:56 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:56 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:56 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:57 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:57 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:57 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:58 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:58 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:59 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:30:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:59 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:30:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:30:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:30:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:00 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:00 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:01 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:01 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:01 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:02 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:02 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:02 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:03 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:03 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:04 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:04 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:05 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:05 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:06 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:06 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:06 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:06 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:07 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:07 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:08 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:08 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:09 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:09 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:10 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:10 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:11 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:11 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:12 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:12 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:13 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:13 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:14 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:14 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:15 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:15 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:16 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:16 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:17 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:17 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:18 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:18 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:19 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:19 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:20 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:20 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:21 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:21 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:22 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:22 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:23 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:23 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:24 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:24 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:25 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:25 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:26 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:26 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:27 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:27 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:28 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:28 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:29 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:29 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:30 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:30 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:31 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:31 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:32 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:32 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:33 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:33 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:34 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:34 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:35 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:35 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:36 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:36 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:36 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:36 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:37 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:37 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:38 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:38 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:39 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:39 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:40 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:40 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:41 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:41 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:41 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:41 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:42 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:42 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:43 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:43 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:44 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:44 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:45 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:45 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:46 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:46 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:46 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:46 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:47 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:47 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:48 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:48 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:49 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:49 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:50 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:50 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:51 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:51 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:51 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:51 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:52 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:52 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:53 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:53 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:54 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:54 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:55 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:55 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:56 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:56 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:56 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:56 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:57 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:57 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:58 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:58 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:59 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:31:59 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:31:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:31:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:31:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:00 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:00 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:01 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:01 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:01 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:01 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:02 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:02 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:03 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:03 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:04 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:04 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:05 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:05 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:05 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:06 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:06 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:06 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:07 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:07 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:08 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:08 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:09 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:09 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:10 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:10 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:10 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:11 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:12 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:12 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:13 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:13 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:14 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:14 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:15 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:15 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:15 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:16 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:17 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:17 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:18 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:18 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:19 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:19 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:20 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:20 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:20 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:21 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:22 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:22 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:23 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:23 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:24 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:24 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:25 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:25 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:25 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:26 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:27 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:27 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:28 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:28 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:29 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:29 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:30 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:30 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:30 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:31 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:32 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:32 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:33 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:33 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:34 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:34 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:34 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:35 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:35 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:36 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:36 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:36 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:37 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:37 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:38 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:38 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:39 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:39 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:39 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:40 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:40 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:41 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:41 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:41 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:42 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:42 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:43 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:43 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:44 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:44 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:44 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:45 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:45 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:46 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:46 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:46 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:47 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:47 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:48 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:48 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:48 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:49 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:49 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:50 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:50 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:51 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:51 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:51 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:52 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:52 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:53 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:53 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:53 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:54 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:54 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:55 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:55 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:55 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:56 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:56 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:57 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:57 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:58 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:58 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:58 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:59 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:32:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:32:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:32:59 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:32:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:00 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:00 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:00 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:01 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:01 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:02 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:02 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:03 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:03 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:03 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:04 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:04 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:05 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:05 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:05 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:06 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:06 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:07 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:07 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:08 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:08 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:08 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:09 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:09 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:10 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:10 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:10 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:11 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:12 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:12 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:12 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:13 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:13 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:14 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:14 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:15 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:15 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:15 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:16 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:17 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:17 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:17 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:18 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:18 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:19 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:19 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:20 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:20 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:20 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:21 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:22 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:22 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:22 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:23 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:23 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:24 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:24 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:25 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:25 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:25 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:26 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:27 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:27 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:27 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:28 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:28 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:29 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:29 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:30 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:30 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:30 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:31 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:32 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:32 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:32 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:33 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:33 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:34 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:34 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:34 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:35 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:35 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:36 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:36 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:36 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:37 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:37 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:38 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:38 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:39 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:39 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:39 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:40 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:40 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:41 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:41 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:41 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:42 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:42 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:43 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:43 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:44 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:44 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:44 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:45 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:45 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:46 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:46 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:46 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:47 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:47 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:48 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:48 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:49 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:49 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:49 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:50 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:50 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:50 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:51 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:51 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:52 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:52 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:53 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:53 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:54 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:54 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:54 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:55 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:55 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:55 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:56 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:56 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:57 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:57 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:58 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:58 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:58 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:59 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:33:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:59 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:33:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:33:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:33:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:00 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:00 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:00 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:01 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:01 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:02 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:02 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:03 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:03 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:03 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:04 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:04 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:05 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:05 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:05 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:06 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:06 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:07 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:07 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:08 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:08 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:08 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:09 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:09 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:10 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:10 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:10 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:11 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:11 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:12 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:12 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:13 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:13 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:13 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:14 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:14 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:14 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:15 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:15 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:16 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:16 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:17 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:17 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:17 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:18 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:18 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:19 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:19 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:19 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:20 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:20 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:21 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:21 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:22 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:22 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:22 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:23 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:23 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:24 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:24 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:24 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:25 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:25 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:26 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:26 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:27 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:27 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:27 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:28 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:28 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:29 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:29 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:29 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:30 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:30 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:31 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:31 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:32 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000ac0)={0x100, 0x75, 0x1, {0xf5, "ef812b015e06932c6a80632c692481bcc4168b51484a117a4188b8fde6f14c7e2cb077f7e02f4ee9e73b2f45e1da0fe13381e442b4cea6bb6dca5ce8938711953a8aa7b353476ed04b62b44865eb00ae7c1ca9a09668888c7b02cf3faeb7a237f3f8b99f85a8ddf92ebcbfb0d288a7e70717da7f0b65514f320dbde1aefcff038f80a47b5243aa766523f9f3923ec44cc5c3d5b7426bfca466b95d07973fb1b426e8534d0b0bcdadc5f7fb67d7e1a915d1c9c6d673c7281a23c292fc68132be68a62989b3cd3936045b969a86ffb9c45e6a653881a711652d6dc1ea6d840238c155e8b2deb4a2dd02c1d757b3ec057771ee6ed6480"}}, 0x100) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000e80), 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000ec0)={0x0, r1, 0x4, 0x0, 0x5, 0x9}) 20:34:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) 20:34:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) dup(0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 20:34:32 executing program 3: accept$inet6(0xffffffffffffff9c, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000001c00)) 20:34:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'team_slave_0\x00', 0x1}, 0x18) panic: ptrace status unexpected: got 31, wanted stopped stubStart = 00007fffffff0000 goroutine 5387936 [running]: DIAGNOSIS: retrieving stacks: getting sandbox "ci-gvisor-main-3" stacks: urpc method "debug.Stacks" failed: connection reset by peer Error collecting stacks: failed to run ["/syzkaller/managers/main/current/image" "-root" "/syzkaller/managers/main/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-platform=ptrace" "-file-access=shared" "-network=none" "debug" "-stacks" "ci-gvisor-main-3"]: exit status 128 retrieving stacks: getting sandbox "ci-gvisor-main-3" stacks: urpc method "debug.Stacks" failed: connection reset by peer gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*thread).dumpAndPanic(0xc001125b30, 0xc00122a940, 0x31) pkg/sentry/platform/ptrace/subprocess.go:317 +0x2c3 gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*thread).wait(0xc001125b30, 0x0, 0x3a46) pkg/sentry/platform/ptrace/subprocess.go:340 +0x1ff gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*thread).syscall(0xc001125b30, 0xc0007e3cc8, 0xc0007e3e68, 0x2, 0x2) pkg/sentry/platform/ptrace/subprocess.go:410 +0xb8 gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*thread).syscallIgnoreInterrupt(0xc001125b30, 0xc001125b40, 0xb, 0xc0007e3e68, 0x2, 0x2, 0x4, 0xc000b5ee10, 0xc000b5ee10) pkg/sentry/platform/ptrace/subprocess.go:448 +0xc2 gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*subprocess).syscall(0xc0001b7080, 0xb, 0xc000b5ee68, 0x2, 0x2, 0x0, 0x0, 0x0) pkg/sentry/platform/ptrace/subprocess.go:582 +0xe8 gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*subprocess).Unmap(0xc0001b7080, 0x0, 0x7fffffff0000) pkg/sentry/platform/ptrace/subprocess.go:622 +0x234 gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*subprocess).unmap(0xc0001b7080) pkg/sentry/platform/ptrace/subprocess.go:218 +0x40 gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*subprocess).Release.func1(0xc0001b7080) pkg/sentry/platform/ptrace/subprocess.go:235 +0x2f created by gvisor.dev/gvisor/pkg/sentry/platform/ptrace.(*subprocess).Release pkg/sentry/platform/ptrace/subprocess.go:234 +0x3f goroutine 1 [semacquire, 43 minutes]: sync.runtime_Semacquire(0xc00021c214) GOROOT/src/runtime/sema.go:56 +0x39 sync.(*WaitGroup).Wait(0xc00021c214) GOROOT/src/sync/waitgroup.go:130 +0x65 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:929 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc0001282c0, 0x0, 0x0) runsc/boot/loader.go:821 +0x3b gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc00018c1b0, 0xea6100, 0xc0000cc008, 0xc00021a420, 0xc0001feb00, 0x2, 0x2, 0x0) runsc/cmd/boot.go:254 +0xcd1 github.com/google/subcommands.(*Commander).Execute(0xc000114000, 0xea6100, 0xc0000cc008, 0xc0001feb00, 0x2, 0x2, 0x0) external/com_github_google_subcommands/subcommands.go:200 +0x2fb github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 main.main() runsc/main.go:261 +0x156a goroutine 5 [syscall]: os/signal.signal_recv(0xe9c380) GOROOT/src/runtime/sigqueue.go:139 +0x9c os/signal.loop() GOROOT/src/os/signal/signal_unix.go:23 +0x22 created by os/signal.init.0 GOROOT/src/os/signal/signal_unix.go:29 +0x41 goroutine 6 [chan receive, 43 minutes, locked to thread]: gvisor.dev/gvisor/pkg/sentry/platform/ptrace.newSubprocess.func1(0xd5cc90, 0xc0001060c0, 0xc000106120) pkg/sentry/platform/ptrace/subprocess.go:164 +0x17d created by gvisor.dev/gvisor/pkg/sentry/platform/ptrace.newSubprocess pkg/sentry/platform/ptrace/subprocess.go:148 +0xd2 goroutine 7 [sync.Cond.Wait]: runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:307 sync.runtime_notifyListWait(0xc000222948, 0x8a57) GOROOT/src/runtime/sema.go:510 +0xf9 sync.(*Cond).Wait(0xc000222938) GOROOT/src/sync/cond.go:56 +0x9e gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000222500, 0x0, 0x0, 0x0) pkg/sentry/pgalloc/pgalloc.go:1079 +0x86 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000222500) pkg/sentry/pgalloc/pgalloc.go:1008 +0x67 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:327 +0x1f8 goroutine 9 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1(0xc00021af60, 0xc00021c190) pkg/sentry/kernel/timekeeper.go:216 +0x164 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater pkg/sentry/kernel/timekeeper.go:184 +0xbf goroutine 17 [semacquire]: sync.runtime_SemacquireMutex(0xc00021c1ec, 0x40c200) GOROOT/src/runtime/sema.go:71 +0x3d sync.(*RWMutex).RLock(...) GOROOT/src/sync/rwmutex.go:50 gvisor.dev/gvisor/pkg/sentry/kernel.(*ThreadGroup).SendSignal(0xc00023c000, 0xc001568d00, 0x0, 0x0) pkg/sentry/kernel/task_signals.go:374 +0x137 gvisor.dev/gvisor/runsc/boot.(*Loader).signalProcess(0xc0001282c0, 0x7ffcd1d6ffd8, 0x10, 0x1100000000, 0x7, 0x44413c) runsc/boot/loader.go:906 +0x501 gvisor.dev/gvisor/runsc/boot.(*Loader).signal(0xc0001282c0, 0x7ffcd1d6ffd8, 0x10, 0x1100000000, 0x0, 0x0, 0x0) runsc/boot/loader.go:872 +0x577 gvisor.dev/gvisor/runsc/boot.New.func1(0x11) runsc/boot/loader.go:353 +0x16e gvisor.dev/gvisor/pkg/sentry/sighandling.handleSignals(0xc0002e0000, 0x21, 0x40, 0xc000251200, 0xc0001064e0, 0xc000106540, 0xc0001065a0) pkg/sentry/sighandling/sighandling.go:101 +0x627 created by gvisor.dev/gvisor/pkg/sentry/sighandling.PrepareHandler pkg/sentry/sighandling/sighandling.go:131 +0x250 goroutine 18 [syscall, 43 minutes]: syscall.Syscall(0x7, 0xc0000d46e8, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0) bazel-out/k8-fastbuild/bin/external/io_bazel_rules_go/linux_amd64_pure_stripped/stdlib%/src/syscall/asm_linux_amd64.s:18 +0x5 gvisor.dev/gvisor/pkg/unet.(*Socket).wait(0xc0002e6000, 0xffffffffffffff00, 0x0, 0x0) pkg/unet/unet_unsafe.go:56 +0x8c gvisor.dev/gvisor/pkg/unet.(*ServerSocket).Accept(0xc0002e8000, 0x0, 0x0, 0x0) pkg/unet/unet.go:539 +0x104 gvisor.dev/gvisor/pkg/control/server.(*Server).serve(0xc0002e4020) pkg/control/server/server.go:99 +0x32 gvisor.dev/gvisor/pkg/control/server.(*Server).StartServing.func1(0xc0002e4020) pkg/control/server/server.go:87 +0x2b created by gvisor.dev/gvisor/pkg/control/server.(*Server).StartServing pkg/control/server/server.go:86 +0x92 goroutine 59 [semacquire, 43 minutes]: sync.runtime_Semacquire(0xc00023c6b8) GOROOT/src/runtime/sema.go:56 +0x39 sync.(*WaitGroup).Wait(0xc00023c6b0) GOROOT/src/sync/waitgroup.go:130 +0x65 gvisor.dev/gvisor/pkg/sentry/kernel.(*ThreadGroup).WaitExited(...) pkg/sentry/kernel/task_run.go:333 gvisor.dev/gvisor/runsc/boot.(*Loader).wait(0xc0001282c0, 0xc00023c000, 0x10) runsc/boot/loader.go:809 +0x35 gvisor.dev/gvisor/runsc/boot.(*Loader).waitContainer(0xc0001282c0, 0xc000256070, 0x10, 0xc000256068, 0x0, 0x3) runsc/boot/loader.go:764 +0x1a5 gvisor.dev/gvisor/runsc/boot.(*containerManager).Wait(0xc0002e4040, 0xc0002d6000, 0xc000256068, 0x0, 0x0) runsc/boot/controller.go:430 +0x7d reflect.Value.call(0xc0002b09c0, 0xc0002e8158, 0x13, 0xd2c7e6, 0x4, 0xc000269ec8, 0x3, 0x3, 0xbb9360, 0x1, ...) GOROOT/src/reflect/value.go:447 +0x461 reflect.Value.Call(0xc0002b09c0, 0xc0002e8158, 0x13, 0xc000269ec8, 0x3, 0x3, 0x0, 0xc0002e4040, 0x16) GOROOT/src/reflect/value.go:308 +0xa4 gvisor.dev/gvisor/pkg/urpc.(*Server).handleOne(0xc0002e6090, 0xc000215710, 0x0, 0x0) pkg/urpc/urpc.go:325 +0x524 gvisor.dev/gvisor/pkg/urpc.(*Server).handleRegistered(0xc0002e6090, 0xc000215710, 0xc0002e6090, 0xc000215710) pkg/urpc/urpc.go:420 +0x35 gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling.func1(0xc0002e6090, 0xc000215710) pkg/urpc/urpc.go:440 +0x65 created by gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling pkg/urpc/urpc.go:438 +0x61 goroutine 33 [syscall]: syscall.Syscall6(0x119, 0x10, 0xc00011bb00, 0x64, 0xffffffffffffffff, 0x0, 0x0, 0x5c921f, 0xc0002152a0, 0xc000250660) bazel-out/k8-fastbuild/bin/external/io_bazel_rules_go/linux_amd64_pure_stripped/stdlib%/src/syscall/asm_linux_amd64.s:44 +0x5 gvisor.dev/gvisor/pkg/fdnotifier.epollWait(0x10, 0xc00011bb00, 0x64, 0x64, 0xffffffffffffffff, 0x1, 0x0, 0x0) pkg/fdnotifier/poll_unsafe.go:71 +0x74 gvisor.dev/gvisor/pkg/fdnotifier.(*notifier).waitAndNotify(0xc00037aba0, 0x0, 0xc000036a00) pkg/fdnotifier/fdnotifier.go:148 +0x7a created by gvisor.dev/gvisor/pkg/fdnotifier.newNotifier pkg/fdnotifier/fdnotifier.go:63 +0xaa goroutine 55 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c240) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 56 [select]: gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).loop(0xc000211420) pkg/sentry/watchdog/watchdog.go:181 +0xce created by gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).Start pkg/sentry/watchdog/watchdog.go:155 +0x1b4 goroutine 57 [runnable]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c2d0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 58 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000225500, 0xc0002ea6c0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000225500, 0xc0002ea6c0, 0xea7400, 0x0, 0x365ad28, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000225500, 0x0, 0xc000281601, 0x365ad28, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000281680, 0xc000034500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000225500, 0x365ad28, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0003fdc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000225500, 0xca, 0x365ad28, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0003fdd10, 0xc0003fddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000225500, 0xca, 0x365ad28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000225500, 0xca, 0x365ad28, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00034c600, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000225500, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000225500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000225500, 0x1) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 15 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 16 [chan receive, 17 minutes, locked to thread]: gvisor.dev/gvisor/pkg/sentry/platform/ptrace.newSubprocess.func1(0xc000330520, 0xc0003482a0, 0xc000348300) pkg/sentry/platform/ptrace/subprocess.go:164 +0x17d created by gvisor.dev/gvisor/pkg/sentry/platform/ptrace.newSubprocess pkg/sentry/platform/ptrace/subprocess.go:148 +0xd2 goroutine 30 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0001f2000, 0xc000390180, 0xc0003483c0, 0x0, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc0001f2000, 0xc000390180, 0x1, 0x27442ae3288, 0x0, 0x0) pkg/sentry/kernel/task_block.go:78 +0x82 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0001f2000, 0xc000390180, 0xea7401, 0xdf8475800, 0x3659f70, 0x200d9e00, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:40 +0xae gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0001f2000, 0xdf8475800, 0x0, 0x3659f70, 0x0, 0xffffffff, 0x200000003, 0xc0002e3680, 0xc000044a00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0001f2000, 0x3659f70, 0x0, 0x0, 0xc4200d9ea8, 0x0, 0x0, 0xc0004e7c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0001f2000, 0xca, 0x3659f70, 0x0, 0x0, 0xc4200d9ea8, 0x0, 0x0, 0xc0004e7d10, 0xc0004e7dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0001f2000, 0xca, 0x3659f70, 0x0, 0x0, 0xc4200d9ea8, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0001f2000, 0xca, 0x3659f70, 0x0, 0x0, 0xc4200d9ea8, 0x0, 0x0, 0xc000182000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0001f2000, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0001f2000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0001f2000, 0x2) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 129 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 60 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00047c000, 0xc0002eaa20, 0xc0002eaa80, 0x0, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc00047c000, 0xc0002eaa20, 0x1, 0x26685ef9598, 0x0, 0x0) pkg/sentry/kernel/task_block.go:78 +0x82 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00047c000, 0xc0002eaa20, 0xea7401, 0x3b9141a4, 0x365e1a0, 0x204e4600, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:40 +0xae gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00047c000, 0x3b9141a4, 0x0, 0x365e1a0, 0x0, 0xffffffff, 0x200000003, 0xc000281800, 0xc000046f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00047c000, 0x365e1a0, 0x0, 0x0, 0xc4204e46d8, 0x0, 0x0, 0xc000511c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00047c000, 0xca, 0x365e1a0, 0x0, 0x0, 0xc4204e46d8, 0x0, 0x0, 0xc000511d10, 0xc000511dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00047c000, 0xca, 0x365e1a0, 0x0, 0x0, 0xc4204e46d8, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00047c000, 0xca, 0x365e1a0, 0x0, 0x0, 0xc4204e46d8, 0x0, 0x0, 0xc00034c6c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00047c000, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00047c000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00047c000, 0x3) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 61 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c360) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 31 [select, 17 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0001f2a80, 0xc0003904e0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0001f2a80, 0xc0003904e0, 0xea7400, 0x0, 0xc4200ca948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0001f2a80, 0x0, 0xc0002e3801, 0xc4200ca948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0002e3800, 0xc00004b900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0001f2a80, 0xc4200ca948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00050bc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0001f2a80, 0xca, 0xc4200ca948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00050bd10, 0xc00050bdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0001f2a80, 0xca, 0xc4200ca948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0001f2a80, 0xca, 0xc4200ca948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000182600, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0001f2a80, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0001f2a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0001f2a80, 0x4) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 75 [select, 21 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a000) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 119 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00039c000, 0xc000106840, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00039c000, 0xc000106840, 0xea7400, 0x0, 0x3678be0, 0x0, 0xffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00039c000, 0x0, 0xc0004cd201, 0x3678be0, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0004cd200, 0xc000032000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00039c000, 0x3678be0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00050fc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00039c000, 0xca, 0x3678be0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00050fd10, 0xc00050fdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00039c000, 0xca, 0x3678be0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00039c000, 0xca, 0x3678be0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00039a000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00039c000, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00039c000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00039c000, 0x5) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 120 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000250000) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 130 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00014a000, 0xc000348a80, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00014a000, 0xc000348a80, 0xea7400, 0x0, 0xc420170148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00014a000, 0x0, 0xc0004da901, 0xc420170148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0004da900, 0xc000040000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00014a000, 0xc420170148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000415c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00014a000, 0xca, 0xc420170148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000415d10, 0xc000415dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00014a000, 0xca, 0xc420170148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00014a000, 0xca, 0xc420170148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0004580c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00014a000, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00014a000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00014a000, 0x6) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 76 [select, 25 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 77 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00015a000, 0xc000324780, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00015a000, 0xc000324780, 0xea7400, 0x0, 0xc4200cad48, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00015a000, 0x0, 0xc000508901, 0xc4200cad48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000508900, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00015a000, 0xc4200cad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0004ebc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00015a000, 0xca, 0xc4200cad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0004ebd10, 0xc0004ebdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00015a000, 0xca, 0xc4200cad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00015a000, 0xca, 0xc4200cad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0003680c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00015a000, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00015a000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00015a000, 0x7) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 32 [select, 13 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015c000) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 145 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0001f3500, 0xc0003912c0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0001f3500, 0xc0003912c0, 0xea7400, 0x0, 0xc420170548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0001f3500, 0x0, 0xc0002e3b01, 0xc420170548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0002e3b00, 0xc000034500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0001f3500, 0xc420170548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000b6bc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0001f3500, 0xca, 0xc420170548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000b6bd10, 0xc000b6bdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0001f3500, 0xca, 0xc420170548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0001f3500, 0xca, 0xc420170548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0001826c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0001f3500, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0001f3500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0001f3500, 0x8) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 78 [select, 37 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 122 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000534000) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 182 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c480) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 180 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005bc000, 0xc000568a20, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005bc000, 0xc000568a20, 0xea7400, 0x0, 0xc4204e6148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005bc000, 0x0, 0xc00040e101, 0xc4204e6148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00040e180, 0xc000040000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005bc000, 0xc4204e6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000417c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005bc000, 0xca, 0xc4204e6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000417d10, 0xc000417dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005bc000, 0xca, 0xc4204e6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005bc000, 0xca, 0xc4204e6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00034cc00, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005bc000, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005bc000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005bc000, 0xe) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 181 [select, 29 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c3f0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 163 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a360) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 162 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a1b0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 88 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005bd500, 0xc000568ba0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005bd500, 0xc000568ba0, 0xea7400, 0x0, 0x17a7b68, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005bd500, 0x0, 0xc0003ccd01, 0x17a7b68, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0003ccd80, 0xc000054f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005bd500, 0x17a7b68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0013c5c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005bd500, 0xca, 0x17a7b68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0013c5d10, 0xc0013c5dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005bd500, 0xca, 0x17a7b68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005bd500, 0xca, 0x17a7b68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000182a80, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005bd500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005bd500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005bd500, 0x11) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 86 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005bca80, 0xc0005682a0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005bca80, 0xc0005682a0, 0xea7400, 0x0, 0xc4204f8548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005bca80, 0x0, 0xc0003ccf01, 0xc4204f8548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0003ccf00, 0xc000042500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005bca80, 0xc4204f8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000c55c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005bca80, 0xca, 0xc4204f8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000c55d10, 0xc000c55dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005bca80, 0xca, 0xc4204f8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005bca80, 0xca, 0xc4204f8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000182780, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005bca80, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005bca80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005bca80, 0x10) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 121 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00043c000, 0xc000106cc0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00043c000, 0xc000106cc0, 0xea7400, 0x0, 0xc4203fa548, 0x43c000, 0xc4ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00043c000, 0x0, 0xc0002e3c01, 0xc4203fa548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0002e3c80, 0xc000034500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00043c000, 0xc4203fa548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000583c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00043c000, 0xca, 0xc4203fa548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000583d10, 0xc000583dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00043c000, 0xca, 0xc4203fa548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00043c000, 0xca, 0xc4203fa548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00043a000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00043c000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00043c000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00043c000, 0x1e) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 150 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005c0000, 0xc000324f00, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005c0000, 0xc000324f00, 0xea7400, 0x0, 0x17c4ec0, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005c0000, 0x0, 0xc0002e3e01, 0x17c4ec0, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0002e3e00, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005c0000, 0x17c4ec0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000364c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005c0000, 0xca, 0x17c4ec0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000364d10, 0xc000364dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005c0000, 0xca, 0x17c4ec0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005c0000, 0xca, 0x17c4ec0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458240, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005c0000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005c0000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005c0000, 0x16) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 149 [select, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015c240) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 131 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00047ca80, 0xc0002ea240, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00047ca80, 0xc0002ea240, 0xea7400, 0x0, 0xc4204f8148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00047ca80, 0x0, 0xc0005dc301, 0xc4204f8148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005dc300, 0xc000040000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00047ca80, 0xc4204f8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0001afc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00047ca80, 0xca, 0xc4204f8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0001afd10, 0xc0001afdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00047ca80, 0xca, 0xc4204f8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00047ca80, 0xca, 0xc4204f8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00034c000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00047ca80, 0x2, 0xc00030e500) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00047ca80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00047ca80, 0xf) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 87 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015cd80) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 89 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00039ca80, 0xc000568f00, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00039ca80, 0xc000568f00, 0xea7400, 0x0, 0xc4200cc948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00039ca80, 0x0, 0xc0005dc601, 0xc4200cc948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005dc600, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00039ca80, 0xc4200cc948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0008ffc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00039ca80, 0xca, 0xc4200cc948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0008ffd10, 0xc0008ffdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00039ca80, 0xca, 0xc4200cc948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00039ca80, 0xca, 0xc4200cc948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000182b40, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00039ca80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00039ca80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00039ca80, 0x14) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 183 [chan receive, 1 minutes, locked to thread]: gvisor.dev/gvisor/pkg/sentry/platform/ptrace.newSubprocess.func1(0xc0003b8040, 0xc000390300, 0xc000390360) pkg/sentry/platform/ptrace/subprocess.go:164 +0x17d created by gvisor.dev/gvisor/pkg/sentry/platform/ptrace.newSubprocess pkg/sentry/platform/ptrace/subprocess.go:148 +0xd2 goroutine 134 [semacquire, 43 minutes]: sync.runtime_Semacquire(0xc00023ceb8) GOROOT/src/runtime/sema.go:56 +0x39 sync.(*WaitGroup).Wait(0xc00023ceb0) GOROOT/src/sync/waitgroup.go:130 +0x65 gvisor.dev/gvisor/pkg/sentry/kernel.(*ThreadGroup).WaitExited(...) pkg/sentry/kernel/task_run.go:333 gvisor.dev/gvisor/runsc/boot.(*Loader).wait(0xc0001282c0, 0xc00023c800, 0x10) runsc/boot/loader.go:809 +0x35 gvisor.dev/gvisor/runsc/boot.(*Loader).waitPID(0xc0001282c0, 0x11, 0xc0004ce110, 0x10, 0xc0004ce104, 0x7efe32cb3b28, 0x0) runsc/boot/loader.go:778 +0x610 gvisor.dev/gvisor/runsc/boot.(*containerManager).WaitPID(0xc0002e4040, 0xc0001feae0, 0xc0004ce104, 0x0, 0x0) runsc/boot/controller.go:447 +0x84 reflect.Value.call(0xc0002b0a20, 0xc0002e8178, 0x13, 0xd2c7e6, 0x4, 0xc000413ec8, 0x3, 0x3, 0xbb9360, 0x1, ...) GOROOT/src/reflect/value.go:447 +0x461 reflect.Value.Call(0xc0002b0a20, 0xc0002e8178, 0x13, 0xc000413ec8, 0x3, 0x3, 0x0, 0xc0002e4040, 0x16) GOROOT/src/reflect/value.go:308 +0xa4 gvisor.dev/gvisor/pkg/urpc.(*Server).handleOne(0xc0002e6090, 0xc0003dc270, 0x0, 0x0) pkg/urpc/urpc.go:325 +0x524 gvisor.dev/gvisor/pkg/urpc.(*Server).handleRegistered(0xc0002e6090, 0xc0003dc270, 0xc0002e6090, 0xc0003dc270) pkg/urpc/urpc.go:420 +0x35 gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling.func1(0xc0002e6090, 0xc0003dc270) pkg/urpc/urpc.go:440 +0x65 created by gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling pkg/urpc/urpc.go:438 +0x61 goroutine 135 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00047d500, 0xc0002ea780, 0xc000160180, 0x0, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc00047d500, 0xc0002ea780, 0x1, 0x27470bdf76f, 0x0, 0x0) pkg/sentry/kernel/task_block.go:78 +0x82 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00047d500, 0xc0002ea780, 0xea7401, 0xdf8475800, 0x17a6f90, 0x200dbe00, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:40 +0xae gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00047d500, 0xdf8475800, 0x0, 0x17a6f90, 0x0, 0xffffffff, 0x200000003, 0xc0005dc900, 0xc000034500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00047d500, 0x17a6f90, 0x0, 0x0, 0xc4200dbea8, 0x0, 0x0, 0xc0007e5c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00047d500, 0xca, 0x17a6f90, 0x0, 0x0, 0xc4200dbea8, 0x0, 0x0, 0xc0007e5d10, 0xc0007e5dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00047d500, 0xca, 0x17a6f90, 0x0, 0x0, 0xc4200dbea8, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00047d500, 0xca, 0x17a6f90, 0x0, 0x0, 0xc4200dbea8, 0x0, 0x0, 0xc00034c3c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00047d500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00047d500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00047d500, 0x12) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 184 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00015aa80, 0xc00196a3c0, 0x0, 0xc0003e4390, 0x473a1d) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc00015aa80, 0xc00196a3c0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_block.go:69 +0x125 gvisor.dev/gvisor/pkg/sentry/syscalls.WaitEpoll(0xc00015aa80, 0xc400000004, 0x80, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/syscalls/epoll.go:164 +0x326 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.EpollWait(0xc00015aa80, 0x4, 0xc4200d78a0, 0x80, 0xffffffff, 0x0, 0xc420000900, 0xc000bd5c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_epoll.go:135 +0x6c gvisor.dev/gvisor/pkg/sentry/syscalls/linux.EpollPwait(0xc00015aa80, 0x4, 0xc4200d78a0, 0x80, 0xffffffff, 0x0, 0xc420000900, 0xc000bd5c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_epoll.go:165 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00015aa80, 0x119, 0x4, 0xc4200d78a0, 0x80, 0xffffffff, 0x0, 0xc420000900, 0xc000bd5d10, 0xc000bd5dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00015aa80, 0x119, 0x4, 0xc4200d78a0, 0x80, 0xffffffff, 0x0, 0xc420000900, 0x0, 0xc420000900) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00015aa80, 0x119, 0x4, 0xc4200d78a0, 0x80, 0xffffffff, 0x0, 0xc420000900, 0xc00039a180, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00015aa80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00015aa80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00015aa80, 0x13) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 136 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000250090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 164 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a3f0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 137 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00014aa80, 0xc0002eacc0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00014aa80, 0xc0002eacc0, 0xea7400, 0x0, 0xc4201b6148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00014aa80, 0x0, 0xc0005dcc01, 0xc4201b6148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005dcc00, 0xc000046f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00014aa80, 0xc4201b6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001135c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00014aa80, 0xca, 0xc4201b6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001135d10, 0xc001135dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00014aa80, 0xca, 0xc4201b6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00014aa80, 0xca, 0xc4201b6148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00034c780, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00014aa80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00014aa80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00014aa80, 0x15) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 165 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a480) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 151 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c1b0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 152 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005c0a80, 0xc000325380, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005c0a80, 0xc000325380, 0xea7400, 0x0, 0xc420204148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005c0a80, 0x0, 0xc000509201, 0xc420204148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000509200, 0xc000042500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005c0a80, 0xc420204148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000895c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005c0a80, 0xca, 0xc420204148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000895d10, 0xc000895dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005c0a80, 0xca, 0xc420204148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005c0a80, 0xca, 0xc420204148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458300, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005c0a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005c0a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005c0a80, 0x17) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 90 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015cea0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 153 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005c1500, 0xc0003255c0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005c1500, 0xc0003255c0, 0xea7400, 0x0, 0xc4201b6948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005c1500, 0x0, 0xc000509301, 0xc4201b6948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000509380, 0xc00005c000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005c1500, 0xc4201b6948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005d3c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005c1500, 0xca, 0xc4201b6948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005d3d10, 0xc0005d3dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005c1500, 0xca, 0xc4201b6948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005c1500, 0xca, 0xc4201b6948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0004583c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005c1500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005c1500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005c1500, 0x18) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 194 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0003b2000) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 166 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000530000, 0xc000160960, 0xc000325620, 0x0, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc000530000, 0xc000160960, 0x1, 0x266ac001767, 0x0, 0x0) pkg/sentry/kernel/task_block.go:78 +0x82 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000530000, 0xc000160960, 0xea7401, 0x3b85415e, 0x17ab060, 0x200c4600, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:40 +0xae gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000530000, 0x3b85415e, 0x0, 0x17ab060, 0x0, 0xffffffff, 0x200000003, 0xc00040e900, 0xc000049400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000530000, 0x17ab060, 0x0, 0x0, 0xc4200c46d8, 0x0, 0x0, 0xc000911c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000530000, 0xca, 0x17ab060, 0x0, 0x0, 0xc4200c46d8, 0x0, 0x0, 0xc000911d10, 0xc000911dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000530000, 0xca, 0x17ab060, 0x0, 0x0, 0xc4200c46d8, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000530000, 0xca, 0x17ab060, 0x0, 0x0, 0xc4200c46d8, 0x0, 0x0, 0xc000368180, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000530000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000530000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000530000, 0x19) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 154 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c240) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 91 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00039d500, 0xc0005695c0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00039d500, 0xc0005695c0, 0xea7400, 0x0, 0xc4200cd548, 0x0, 0xffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00039d500, 0x0, 0xc000594301, 0xc4200cd548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000594300, 0xc000054f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00039d500, 0xc4200cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000cc6c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00039d500, 0xca, 0xc4200cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000cc6d10, 0xc000cc6dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00039d500, 0xca, 0xc4200cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00039d500, 0xca, 0xc4200cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000182c00, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00039d500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00039d500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00039d500, 0x1a) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 92 [select, 7 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015cf30) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 195 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0003a8000, 0xc000348840, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0003a8000, 0xc000348840, 0xea7400, 0x0, 0xc4203d8148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0003a8000, 0x0, 0xc0004cd801, 0xc4203d8148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0004cd800, 0xc000036a00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0003a8000, 0xc4203d8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001117c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0003a8000, 0xca, 0xc4203d8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001117d10, 0xc001117dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0003a8000, 0xca, 0xc4203d8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0003a8000, 0xca, 0xc4203d8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00052c0c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0003a8000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0003a8000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0003a8000, 0x1b) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 93 [select, 27 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015cfc0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 155 [select, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000404000, 0xc000325d40, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000404000, 0xc000325d40, 0xea7400, 0x0, 0xc420204548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000404000, 0x0, 0xc000509601, 0xc420204548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000509680, 0xc000034500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000404000, 0xc420204548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00090dc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000404000, 0xca, 0xc420204548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00090dd10, 0xc00090ddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000404000, 0xca, 0xc420204548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000404000, 0xca, 0xc420204548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458480, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000404000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000404000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000404000, 0x1c) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 138 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000250120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 156 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000404a80, 0xc000325f80, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000404a80, 0xc000325f80, 0xea7400, 0x0, 0xc4203d8548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000404a80, 0x0, 0xc000509801, 0xc4203d8548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000509800, 0xc000052a00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000404a80, 0xc4203d8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000116c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000404a80, 0xca, 0xc4203d8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000116d10, 0xc000116dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000404a80, 0xca, 0xc4203d8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000404a80, 0xca, 0xc4203d8548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458540, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000404a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000404a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000404a80, 0x1d) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 185 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c510) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 241 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000564000, 0xc00054c180, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000564000, 0xc00054c180, 0xea7400, 0x0, 0xc4203d8948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000564000, 0x0, 0xc0005e6001, 0xc4203d8948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005e6000, 0xc000046f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000564000, 0xc4203d8948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005adc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000564000, 0xca, 0xc4203d8948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005add10, 0xc0005addc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000564000, 0xca, 0xc4203d8948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000564000, 0xca, 0xc4203d8948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000562000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000564000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000564000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000564000, 0x1f) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 210 [select, 7 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005e8000) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 157 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000405500, 0xc0005481e0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000405500, 0xc0005481e0, 0xea7400, 0x0, 0xc4203fa948, 0x0, 0xffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000405500, 0x0, 0xc000509901, 0xc4203fa948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000509980, 0xc000046f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000405500, 0xc4203fa948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00071fc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000405500, 0xca, 0xc4203fa948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00071fd10, 0xc00071fdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000405500, 0xca, 0xc4203fa948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000405500, 0xca, 0xc4203fa948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458600, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000405500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000405500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000405500, 0x20) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 243 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005fa000) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 244 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000564a80, 0xc00054c420, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000564a80, 0xc00054c420, 0xea7400, 0x0, 0xc4203d8d48, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000564a80, 0x0, 0xc0005e6401, 0xc4203d8d48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005e6480, 0xc000042500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000564a80, 0xc4203d8d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005cdc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000564a80, 0xca, 0xc4203d8d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005cdd10, 0xc0005cddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000564a80, 0xca, 0xc4203d8d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000564a80, 0xca, 0xc4203d8d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000562180, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000564a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000564a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000564a80, 0x21) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 158 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c2d0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 226 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000624000, 0xc000606180, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000624000, 0xc000606180, 0xea7400, 0x0, 0xc4203d9148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000624000, 0x0, 0xc000586401, 0xc4203d9148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000586480, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000624000, 0xc4203d9148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0011fdc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000624000, 0xca, 0xc4203d9148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0011fdd10, 0xc0011fddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000624000, 0xca, 0xc4203d9148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000624000, 0xca, 0xc4203d9148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000622000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000624000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000624000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000624000, 0x22) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 139 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0002501b0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 159 [select, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00014b500, 0xc0002ea4e0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00014b500, 0xc0002ea4e0, 0xea7400, 0x0, 0xc4203fad48, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00014b500, 0x0, 0xc0005dd001, 0xc4203fad48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005dd080, 0xc000054f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00014b500, 0xc4203fad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000421c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00014b500, 0xca, 0xc4203fad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000421d10, 0xc000421dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00014b500, 0xca, 0xc4203fad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00014b500, 0xca, 0xc4203fad48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00034c180, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00014b500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00014b500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00014b500, 0x23) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 123 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000250240) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 94 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000565500, 0xc000606420, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000565500, 0xc000606420, 0xea7400, 0x0, 0xc4203d9548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000565500, 0x0, 0xc000586601, 0xc4203d9548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000586600, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000565500, 0xc4203d9548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0001b3c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000565500, 0xca, 0xc4203d9548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0001b3d10, 0xc0001b3dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000565500, 0xca, 0xc4203d9548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000565500, 0xca, 0xc4203d9548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000622180, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000565500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000565500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000565500, 0x24) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 95 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005fa090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 160 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000624a80, 0xc0002ea960, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000624a80, 0xc0002ea960, 0xea7400, 0x0, 0xc4203fb148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000624a80, 0x0, 0xc0005dd201, 0xc4203fb148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005dd200, 0xc000049400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000624a80, 0xc4203fb148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001107c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000624a80, 0xca, 0xc4203fb148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001107d10, 0xc001107dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000624a80, 0xca, 0xc4203fb148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000624a80, 0xca, 0xc4203fb148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00034c9c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000624a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000624a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000624a80, 0x25) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 186 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005e8090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 96 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0003a8a80, 0xc000606720, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0003a8a80, 0xc000606720, 0xea7400, 0x0, 0xc4203fb548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0003a8a80, 0x0, 0xc000586901, 0xc4203fb548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000586900, 0xc000042500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0003a8a80, 0xc4203fb548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00071bc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0003a8a80, 0xca, 0xc4203fb548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00071bd10, 0xc00071bdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0003a8a80, 0xca, 0xc4203fb548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0003a8a80, 0xca, 0xc4203fb548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000622300, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0003a8a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0003a8a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0003a8a80, 0x26) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 257 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005fa120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 140 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000530a80, 0xc0003242a0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000530a80, 0xc0003242a0, 0xea7400, 0x0, 0xc4203d9948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000530a80, 0x0, 0xc0004cd901, 0xc4203d9948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0004cd980, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000530a80, 0xc4203d9948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00066bc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000530a80, 0xca, 0xc4203d9948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00066bd10, 0xc00066bdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000530a80, 0xca, 0xc4203d9948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000530a80, 0xca, 0xc4203d9948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000182840, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000530a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000530a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000530a80, 0x27) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 124 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000250360) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 125 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00043ca80, 0xc00054ca80, 0xc000324300, 0x0, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc00043ca80, 0xc00054ca80, 0x1, 0x27431c44007, 0x0, 0x0) pkg/sentry/kernel/task_block.go:78 +0x82 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00043ca80, 0xc00054ca80, 0xea7401, 0xdf8444539, 0x17ab0e0, 0x203a1e00, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:40 +0xae gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00043ca80, 0xdf8444539, 0x0, 0x17ab0e0, 0x0, 0xffffffff, 0x200000003, 0xc0005e6900, 0xc000054f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00043ca80, 0x17ab0e0, 0x0, 0x0, 0xc4203a1ed8, 0x0, 0x0, 0xc00069fc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00043ca80, 0xca, 0x17ab0e0, 0x0, 0x0, 0xc4203a1ed8, 0x0, 0x0, 0xc00069fd10, 0xc00069fdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00043ca80, 0xca, 0x17ab0e0, 0x0, 0x0, 0xc4203a1ed8, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00043ca80, 0xca, 0x17ab0e0, 0x0, 0x0, 0xc4203a1ed8, 0x0, 0x0, 0xc000562240, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00043ca80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00043ca80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00043ca80, 0x28) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 141 [select, 19 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0003b2090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 258 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0003a9500, 0xc000607260, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0003a9500, 0xc000607260, 0xea7400, 0x0, 0xc4203d9d48, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0003a9500, 0x0, 0xc000586c01, 0xc4203d9d48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000586c00, 0xc000036a00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0003a9500, 0xc4203d9d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0007cfc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0003a9500, 0xca, 0xc4203d9d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0007cfd10, 0xc0007cfdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0003a9500, 0xca, 0xc4203d9d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0003a9500, 0xca, 0xc4203d9d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0006223c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0003a9500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0003a9500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0003a9500, 0x29) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 196 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015c090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 259 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00015b500, 0xc0006074a0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00015b500, 0xc0006074a0, 0xea7400, 0x0, 0xc4203fbd48, 0x0, 0xffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00015b500, 0x0, 0xc000586d01, 0xc4203fbd48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000586d80, 0xc000042500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00015b500, 0xc4203fbd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005a3c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00015b500, 0xca, 0xc4203fbd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005a3d10, 0xc0005a3dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00015b500, 0xca, 0xc4203fbd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00015b500, 0xca, 0xc4203fbd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000622480, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00015b500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00015b500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00015b500, 0x2a) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 187 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005e8120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 197 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0003d6000, 0xc000160d20, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0003d6000, 0xc000160d20, 0xea7400, 0x0, 0xc420226948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0003d6000, 0x0, 0xc000594901, 0xc420226948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000594900, 0xc000032000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0003d6000, 0xc420226948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0006a1c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0003d6000, 0xca, 0xc420226948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0006a1d10, 0xc0006a1dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0003d6000, 0xca, 0xc420226948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0003d6000, 0xca, 0xc420226948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000368240, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0003d6000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0003d6000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0003d6000, 0x2b) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 126 [select, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0002503f0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 167 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000512000, 0xc000569440, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000512000, 0xc000569440, 0xea7400, 0x0, 0xc420226548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000512000, 0x0, 0xc00052a001, 0xc420226548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00052a000, 0xc000049400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000512000, 0xc420226548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000f4dc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000512000, 0xca, 0xc420226548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000f4dd10, 0xc000f4ddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000512000, 0xca, 0xc420226548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000512000, 0xca, 0xc420226548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000512000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000512000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000512000, 0x2c) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 142 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0003b2120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 127 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00043d500, 0xc00054ce40, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00043d500, 0xc00054ce40, 0xea7400, 0x0, 0xc4201b7148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00043d500, 0x0, 0xc0005e6f01, 0xc4201b7148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005e6f00, 0xc000036a00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00043d500, 0xc4201b7148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000bdbc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00043d500, 0xca, 0xc4201b7148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000bdbd10, 0xc000bdbdc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00043d500, 0xca, 0xc4201b7148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00043d500, 0xca, 0xc4201b7148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000562300, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00043d500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00043d500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00043d500, 0x2d) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 289 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a240) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 168 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000512a80, 0xc0003905a0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000512a80, 0xc0003905a0, 0xea7400, 0x0, 0xc420226d48, 0x0, 0xffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000512a80, 0x0, 0xc00052a101, 0xc420226d48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00052a180, 0xc000062f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000512a80, 0xc420226d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000665c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000512a80, 0xca, 0xc420226d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000665d10, 0xc000665dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000512a80, 0xca, 0xc420226d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000512a80, 0xca, 0xc420226d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0004586c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000512a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000512a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000512a80, 0x2e) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 169 [select, 38 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c360) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 274 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005d8000, 0xc0001069c0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005d8000, 0xc0001069c0, 0xea7400, 0x0, 0xc4201b7d48, 0x197d00, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005d8000, 0x0, 0xc0003e0401, 0xc4201b7d48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0003e0480, 0xc00003b400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005d8000, 0xc4201b7d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001537c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005d8000, 0xca, 0xc4201b7d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001537d10, 0xc001537dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005d8000, 0xca, 0xc4201b7d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005d8000, 0xca, 0xc4201b7d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00043a0c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005d8000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005d8000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005d8000, 0x2f) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 275 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000534090) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 290 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000625500, 0xc0002eb6e0, 0xc0002eb740, 0x0, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc000625500, 0xc0002eb6e0, 0x1, 0x270f0228f18, 0x0, 0x0) pkg/sentry/kernel/task_block.go:78 +0x82 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000625500, 0xc0002eb6e0, 0xea7401, 0xdf8443a3b, 0x17ab160, 0x203f6600, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:40 +0xae gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000625500, 0xdf8443a3b, 0x0, 0x17ab160, 0x0, 0xffffffff, 0x200000003, 0xc0005dd500, 0xc000042500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000625500, 0x17ab160, 0x0, 0x0, 0xc4203f66d8, 0x0, 0x0, 0xc00071dc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000625500, 0xca, 0x17ab160, 0x0, 0x0, 0xc4203f66d8, 0x0, 0x0, 0xc00071dd10, 0xc00071ddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000625500, 0xca, 0x17ab160, 0x0, 0x0, 0xc4203f66d8, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000625500, 0xca, 0x17ab160, 0x0, 0x0, 0xc4203f66d8, 0x0, 0x0, 0xc00034ca80, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000625500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000625500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000625500, 0x30) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 291 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00032a2d0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 128 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00041a000, 0xc00054d740, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00041a000, 0xc00054d740, 0xea7400, 0x0, 0xc420205148, 0x16e400, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00041a000, 0x0, 0xc0005e7001, 0xc420205148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005e7080, 0xc000040000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00041a000, 0xc420205148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0007a1c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00041a000, 0xca, 0xc420205148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0007a1d10, 0xc0007a1dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00041a000, 0xca, 0xc420205148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00041a000, 0xca, 0xc420205148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005623c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00041a000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00041a000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00041a000, 0x31) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 276 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000534120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 211 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00059c000, 0xc000348ae0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00059c000, 0xc000348ae0, 0xea7400, 0x0, 0xc420227548, 0x0, 0xffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00059c000, 0x0, 0xc00040ed01, 0xc420227548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00040ed80, 0xc000038f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00059c000, 0xc420227548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000713c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00059c000, 0xca, 0xc420227548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000713d10, 0xc000713dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00059c000, 0xca, 0xc420227548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00059c000, 0xca, 0xc420227548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00039a0c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00059c000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00059c000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00059c000, 0x32) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 277 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005341b0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 212 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00059ca80, 0xc000348d20, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00059ca80, 0xc000348d20, 0xea7400, 0x0, 0xc420205548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00059ca80, 0x0, 0xc00040ef01, 0xc420205548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00040ef00, 0xc000054f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00059ca80, 0xc420205548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000a99c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00059ca80, 0xca, 0xc420205548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000a99d10, 0xc000a99dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00059ca80, 0xca, 0xc420205548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00059ca80, 0xca, 0xc420205548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00039a300, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00059ca80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00059ca80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00059ca80, 0x33) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 143 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0003b21b0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 170 [select, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000513500, 0xc000391920, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000513500, 0xc000391920, 0xea7400, 0x0, 0xc4200cd948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000513500, 0x0, 0xc00052a401, 0xc4200cd948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00052a480, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000513500, 0xc4200cd948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000653c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000513500, 0xca, 0xc4200cd948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000653d10, 0xc000653dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000513500, 0xca, 0xc4200cd948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000513500, 0xca, 0xc4200cd948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458780, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000513500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000513500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000513500, 0x34) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 144 [select, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0003b2240) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 171 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00068c000, 0xc000391e60, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00068c000, 0xc000391e60, 0xea7400, 0x0, 0xc4204cc548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00068c000, 0x0, 0xc00052a601, 0xc4204cc548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00052a600, 0xc000036a00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00068c000, 0xc4204cc548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000423c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00068c000, 0xca, 0xc4204cc548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000423d10, 0xc000423dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00068c000, 0xca, 0xc4204cc548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00068c000, 0xca, 0xc4204cc548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458840, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00068c000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00068c000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00068c000, 0x35) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 172 [select, 2 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c3f0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 173 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00068ca80, 0xc00068f080, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00068ca80, 0xc00068f080, 0xea7400, 0x0, 0xc42028b548, 0x0, 0xffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00068ca80, 0x0, 0xc00052a901, 0xc42028b548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc00052a900, 0xc000032000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00068ca80, 0xc42028b548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000891c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00068ca80, 0xca, 0xc42028b548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000891d10, 0xc000891dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00068ca80, 0xca, 0xc42028b548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00068ca80, 0xca, 0xc42028b548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000458900, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00068ca80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00068ca80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00068ca80, 0x36) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 174 [select, 28 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c480) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 227 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0006bc000, 0xc0005495c0, 0xc000549620, 0x0, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc0006bc000, 0xc0005495c0, 0x1, 0x27462cf7219, 0x0, 0x0) pkg/sentry/kernel/task_block.go:78 +0x82 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0006bc000, 0xc0005495c0, 0xea7401, 0xdf83ef742, 0x17ab560, 0x203b7600, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:40 +0xae gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0006bc000, 0xdf83ef742, 0x0, 0x17ab560, 0x0, 0xffffffff, 0x200000003, 0xc0003cdb00, 0xc00003d900) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0006bc000, 0x17ab560, 0x0, 0x0, 0xc4203b76d8, 0x0, 0x0, 0xc00076dc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0006bc000, 0xca, 0x17ab560, 0x0, 0x0, 0xc4203b76d8, 0x0, 0x0, 0xc00076dd10, 0xc00076ddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0006bc000, 0xca, 0x17ab560, 0x0, 0x0, 0xc4203b76d8, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0006bc000, 0xca, 0x17ab560, 0x0, 0x0, 0xc4203b76d8, 0x0, 0x0, 0xc0006ba000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0006bc000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0006bc000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0006bc000, 0x37) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 228 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c5a0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 188 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000708000, 0xc000408a20, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000708000, 0xc000408a20, 0xea7400, 0x0, 0xc42028bd48, 0xa1e300, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000708000, 0x0, 0xc0004db301, 0xc42028bd48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0004db380, 0xc00003b400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000708000, 0xc42028bd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005f1c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000708000, 0xca, 0xc42028bd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005f1d10, 0xc0005f1dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000708000, 0xca, 0xc42028bd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000708000, 0xca, 0xc42028bd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00052c180, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000708000, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc000708000, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000708000, 0x38) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 175 [select, 1 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c510) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 176 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005d8a80, 0xc00068ed80, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005d8a80, 0xc00068ed80, 0xea7400, 0x0, 0xc4204cd548, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005d8a80, 0x0, 0xc0006f6101, 0xc4204cd548, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0006f6180, 0xc000032000) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005d8a80, 0xc4204cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00081dc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005d8a80, 0xca, 0xc4204cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00081dd10, 0xc00081ddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005d8a80, 0xca, 0xc4204cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005d8a80, 0xca, 0xc4204cd548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00043a180, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005d8a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005d8a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005d8a80, 0x39) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 337 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000534240) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 198 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0006bca80, 0xc0005483c0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0006bca80, 0xc0005483c0, 0xea7400, 0x0, 0xc420214148, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0006bca80, 0x0, 0xc0003e0a01, 0xc420214148, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0003e0a80, 0xc000062f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0006bca80, 0xc420214148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00078dc74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0006bca80, 0xca, 0xc420214148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00078dd10, 0xc00078ddc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0006bca80, 0xca, 0xc420214148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0006bca80, 0xca, 0xc420214148, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00039a240, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0006bca80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0006bca80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0006bca80, 0x3a) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 189 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00018c630) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 369 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0005d9500, 0xc00068f200, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0005d9500, 0xc00068f200, 0xea7400, 0x0, 0xc420214d48, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0005d9500, 0x0, 0xc0006f6301, 0xc420214d48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0006f6300, 0xc000057400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0005d9500, 0xc420214d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0007c9c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0005d9500, 0xca, 0xc420214d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0007c9d10, 0xc0007c9dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0005d9500, 0xca, 0xc420214d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005d9500, 0xca, 0xc420214d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00043a240, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0005d9500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0005d9500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0005d9500, 0x3b) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 370 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00015c120) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 306 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00059d500, 0xc0002eab40, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00059d500, 0xc0002eab40, 0xea7400, 0x0, 0xc4204f0948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00059d500, 0x0, 0xc000587201, 0xc4204f0948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000587200, 0xc000042500) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00059d500, 0xc4204f0948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000837c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00059d500, 0xca, 0xc4204f0948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000837d10, 0xc000837dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00059d500, 0xca, 0xc4204f0948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00059d500, 0xca, 0xc4204f0948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000368000, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00059d500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00059d500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00059d500, 0x3c) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 307 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0005fa1b0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 386 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0003d6a80, 0xc0006a69c0, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc0003d6a80, 0xc0006a69c0, 0xea7400, 0x0, 0xc4204f0d48, 0x3d6a00, 0xc4ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0003d6a80, 0x0, 0xc000594c01, 0xc4204f0d48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000594c00, 0xc000038f00) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0003d6a80, 0xc4204f0d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005a9c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0003d6a80, 0xca, 0xc4204f0d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005a9d10, 0xc0005a9dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0003d6a80, 0xca, 0xc4204f0d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0003d6a80, 0xca, 0xc4204f0d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0006220c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0003d6a80, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc0003d6a80, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0003d6a80, 0x3d) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 245 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00030c5a0) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 292 [select, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00068d500, 0xc0006f4600, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00068d500, 0xc0006f4600, 0xea7400, 0x0, 0xc420616948, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00068d500, 0x0, 0xc0005e7201, 0xc420616948, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc0005e7200, 0xc000065400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00068d500, 0xc420616948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000d95c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00068d500, 0xca, 0xc420616948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000d95d10, 0xc000d95dc8, ...) pkg/sentry/kernel/task_syscall.go:165 +0x10a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00068d500, 0xca, 0xc420616948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pkg/sentry/kernel/task_syscall.go:283 +0x69 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00068d500, 0xca, 0xc420616948, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0005620c0, 0xebf6a0) pkg/sentry/kernel/task_syscall.go:244 +0x96 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00068d500, 0x2, 0xc0001b6600) pkg/sentry/kernel/task_syscall.go:219 +0x13d gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0x0, 0xc00068d500, 0xe95820, 0x0) pkg/sentry/kernel/task_run.go:219 +0xe09 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00068d500, 0x3e) pkg/sentry/kernel/task_run.go:91 +0x194 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:287 +0xfe goroutine 293 [select, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000250480) pkg/sentry/kernel/time/time.go:512 +0xb9 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:491 +0x150 goroutine 260 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00041aa80, 0xc000160a80, 0x0, 0x1, 0x0) pkg/sentry/kernel/task_block.go:124 +0xff gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00041aa80, 0xc000160a80, 0xea7400, 0x0, 0xc4204b1d48, 0x0, 0xc0ffffffff) pkg/sentry/kernel/task_block.go:35 +0x1f8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00041aa80, 0x0, 0xc000696001, 0xc4204b1d48, 0x435e00, 0xc0ffffffff, 0x200000003, 0xc000696000, 0xc000057400) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00041aa80, 0xc4204b1d48, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000789c74, 0x40000002, 0x0, ...) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x107 gvisor.dev/gvisor/pkg/sentry/kernel.(