r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="341961f77ae803400b3684decd4a340dc9fca704b6518b5e43597bff38f10f2080bb9300ba00af85bd082aa22d80e8bbcc78a0bb6a4a080b544e82478e222a5061f5e63c2279d967ab9bf56cb44268de1587fcb1abcb6748f06735861be493ea5adfacd6f582f77927097160c719e4b7b72bbb6c4480bfa061ba67dca622041428998c50626f4c48ff9ca40431249b48d358cec002821ed745ffeca91c77a7868e209fc2037d1c3a29be8709a8949b3d01cecc52caa3c5bc11ccc9464fa3e819a6081d2f74e84bfaab7a364ba7d9aea24b2e066d06920beaf4003a3cf7c18f58709d", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf250a0000002c000180080009005a0000000800050001000000060004004e2400000800060073656400080009007d000000340003800800010002000000060007004e240000060004008a0e000008000500ac14141a0800050000000000080001000200000008000500010001000800060003000000"], 0x84}, 0x1, 0x0, 0x0, 0x20000800}, 0x8011) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) move_mount(r1, 0x0, 0xffffffffffffffff, 0x0, 0x40) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000980)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b876811a37d35af779d731a0b29fa5d1d8dabd6747d6fccdd4e8dc60dd97f90bee9e881469900b3c2ae6059498db854672294662e886f07dab4e3242cedbcb49520037a4d31d1ec9992db2e113bb2975208d51c947c5c285b97382a21c64484b2fdb6a6337d7d8ea2d1116a56e4b57146424168f4508d6a93844e0d5e763b6e9c515921c0e3585441190f0bece6517bd701bf47eb9c6b54a3a1fdbc7c3968cbcf69852380e3da495251b99e75c33348365d94f97242ec6867cf1d07a2b9e970dfd4cd3f0c2f9869ae810f72219682ff5eab844cc000a9fa84b9d5f6018c43af114d06b531109e3056a92b656adb88de9dc61c5c66570567345a3472c9bd5fdccdea3921be097e994f95fab5d537f67b6fa216dd265efc03e9f942f680af07c96ba148cb3c0cf601e111f42a0cf6a93dd0cec61b75c7fda2beb629d16df32ab5c68519b1eb2a70e06f6029e"]) r2 = perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup2(r3, r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a)